Blar i Scientific Publications in Information and Communication Technology på tittel
Viser treff 546-565 av 684
-
Scenario-based Serious Game to Teach about Healthcare
(Chapter; Peer reviewed, 2019)In this paper, we explore the concept of a scenario-based serious game for healthcare solutions. The complexity of the interactions and the multitude of actors is captured in a scenario, which is then played with the help ... -
Secure and Efficient Data Storage in Unattended Wireless Sensor Networks
(Journal article; Peer reviewed, 2009)Providing forward and backward secrecy is still a big challenge in Unattended Wireless Sensor Networks (UWSNs), though some storage schemes have been proposed. Additionally, high storage requirement needs efficient storage ... -
Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications
(Peer reviewed; Journal article, 2023)One of the most significant recent advances in technology is the advent of unmanned aerial vehicles (UAVs), i.e., drones. They have widened the scope of possible applications and provided a platform for a wide range of ... -
Secure Group Communication Using Fractional Public Keys
(Peer reviewed; Journal article, 2010)In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement scheme that is based on fractional public keys. Shared group keys are computed ... -
Secure interworking with P2PSIP and IMS
(Academic article, 2010)In this paper, we propose a secure system model for interconnection between P2PSIP and IMS domains. The interworking solution is based on P2P-IMS GateWay (PIGW), which acts as a normal peer in P2PSIP network and a 3. party ... -
Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks
(Journal article; Peer reviewed, 2010)In unattended wireless sensor networks (UWSNs), sensed data are stored locally or at designated nodes and further accessed by authorized collectors on demand. This paradigm is motivated by certain scenarios where historical ... -
Security in mobile wireless sensor networks - A survey
(Journal article; Peer reviewed, 2011)Thanks to recent advances in robotics, sensors and wireless communications, it is feasible to develop a variety of new architectures for Mobile Wireless Sensor Networks (MWSNs) that play an important role in various ... -
Security Management in Health Care Information Systems- A Literature Review
(Chapter; Peer reviewed, 2018) -
Seeking Information on Social Commerce: An Examination of the Impact of User- and Marketer-generated Content Through an Eye-tracking Study
(Peer reviewed; Journal article, 2020) -
Self-Powered IoT Device for Indoor Applications
(Journal article; Peer reviewed, 2018) -
Self-supervised embedding for generalized zero-shot learning in remote sensing scene classification
(Peer reviewed; Journal article, 2023)Generalized zero-shot learning (GZSL) is the most popular approach for developing ZSL, which involves both seen and unseen classes in the classification process. Many of the existing GZSL approaches for scene classification ... -
Semi-supervised classification using tree-based self-organizing maps
(Lecture Notes in Computer Science;7106, Chapter; Peer reviewed, 2011)This paper presents a classifier which uses a tree-based Neural Network (NN), and uses both, unlabeled and labeled instances. First, we learn the structure of the data distribution in an unsupervised manner. After convergence, ... -
Service selection in stochastic environments: a learning-automaton based solution
(Journal article; Peer reviewed, 2011)In this paper, we propose a novel solution to the problem of identifying services of high quality. The reported solutions to this problem have, in one way or the other, resorted to using so-called “Reputation Systems” ... -
SFTSDH: Applying Spring Security Framework with TSD-Based OAuth2 to Protect Microservice Architecture APIs
(Peer reviewed; Journal article, 2022)The Internet of Medical Things (IoMT) combines medical devices and applications that use network technologies to connect healthcare information systems (HIS). IoMT is reforming the medical industry by adopting information ... -
Sharing With Care- Multidisciplinary Teams and Secure Access to Electronic Health Records
(Chapter; Peer reviewed, 2018)Ensuring patient privacy and improving patient care quality are two of the most significant challenges faced by healthcare systems around the world. This paper describes the importance and challenges of effective ... -
Sharing, Cooperation or Collective Action? A Research Agenda for Online Interaction in Digital Global Governance
(International Conference on Electronic Participation;, Peer reviewed; Conference object, 2023)Digital technologies are increasingly used to support governance at the global level. However, the global level has received very little attention in digital governance research. Global governance differs from national ... -
A Simple and Efficient Deep Learning-Based Framework for Automatic Fruit Recognition
(Peer reviewed; Journal article, 2022)Accurate detection and recognition of various kinds of fruits and vegetables by using the artificial intelligence (AI) approach always remain a challenging task due to similarity between various types of fruits and challenging ... -
Simulation of eHealth Scenarios with Role-play Supported by an Interactive Smartphone Application
(Journal article; Peer reviewed, 2019) -
A Simulation-based Performance Evaluation of Heuristics for Dew Computing
(Peer reviewed; Journal article, 2021) -
Simulation-Supported Wargaming for Assessing Force Structures
(Peer reviewed; Journal article, 2022)Wargaming is a key activity for gaining deeper insight into the strengths and weaknesses of future force structures in the course of their development and assessment. For more than a decade, the Norwegian Defence Research ...