Selaus Oppiaineen mukaanArtikkelitTietotekniikka
Aineistot 21-40 / 124
-
Bayesian-Edge system for classification and segmentation of skin lesions in Internet of Medical Things
(John Wiley & Sons Ltd, 31.07.2024)
articleSkin diseases are severe diseases. Identification of these severe diseases depends upon the abstraction of atypical skin regions. The segmentation of these skin diseases is essential to rheumatologists in risk impost and ... -
Blockchain and Internet of Things in smart cities and drug supply management: Open issues, opportunities, and future directions
(Elsevier, 29.06.2023)
articleBlockchain-based drug supply management (DSM) requires powerful security and privacy procedures for high-level authentication, interoperability, and medical record sharing. Researchers have shown a surprising interest in ... -
Changing patterns in the process of digital transformation initiative in established firms : the case of an energy sector company
(Association for Information Systems (AIS), 03.06.2020)
conferenceObjectRapid digitalization and technological change are disrupting traditionally successful business models. This motivates firms to adopt new strategies based on digital technologies; such new strategies are often referred to ... -
Citizen science in information systems research : evidence from a systematic literature review
(07.01.2020)
articleCitizen science refers to partnerships between scientists and the public in scientific research. Citizen science is considered as an emerging approach for conducting research in the field of information systems (IS). However, ... -
Cluster-based wireless sensor network framework for denial-of-service attack detection based on variable selection ensemble machine learning algorithms
(Elsevier, 30.04.2024)
articleA Cluster-Based Wireless Sensor Network (CBWSN) is a system designed to remotely control and monitor specific events or phenomena in areas such as smart grids, intelligent healthcare, circular economies in smart cities, ... -
CO2 emission based GDP prediction using intuitionistic fuzzy transfer learning
(Elsevier, 08.08.2023)
articleThe industrialization has been the primary cause of the economic boom in almost all countries. However, this happened at the cost of the environment, as industrialization also caused carbon emissions to increase exponentially. ... -
Comparison of Machine Learning algorithms for venue presence with inclusion of neighbours
(IEEE, 29.12.2021)
articleUser presence determination for being inside a venue, such that the user is provided with possible value-added services, is of high significance. It will get more prominent as we move to 5G and 6G networks’ rollout as we’ll ... -
Construction of Prioritized T-Way Test Suite Using Bi-Objective Dragonfly Algorithm
(IEEE, 06.07.2022)
articleSoftware testing is important for ensuring the reliability of software systems. In software testing, effective test case generation is essential as an alternative to exhaustive testing. For improving the software testing ... -
CS-FuzGA-PTS : Maximizing Fault Detection Through Optimizing T-Way Test Suite Prioritization Based on Boundary Value Analysis
(IEEE, 13.11.2024)
articleIn the realm of software testing, resource limitations pose a significant challenge to ensuring comprehensive testing coverage. While there are numerous attempts to systematically generate test cases that maximize input ... -
Customised ResNet architecture for subtle color classification
(Taylor & Francis, 19.02.2025)
articleThis study addresses the challenge of recognizing subtle color differences, a problem critical to applications in fields such as healthcare, food production, and civil engineering. Specially research focusses on printed ... -
Cyber Intrusion Detection System Based on a Multiobjective Binary Bat Algorithm for Feature Selection and Enhanced Bat Algorithm for Parameter Optimization in Neural Networks
(IEEE, 19.07.2022)
articleThe staggering development of cyber threats has propelled experts, professionals and specialists in the field of security into the development of more dependable protection systems, including effective intrusion detection ... -
Cyberattack patterns in blockchain-based communication networks for distributed renewable energy systems : A study on big datasets
(Elsevier, 29.02.2024)
articleBlockchain-based reliable, resilient, and secure communication for Distributed Energy Resources (DERs) is essential in Smart Grid (SG). The Solana blockchain, due to its high stability, scalability, and throughput, along ... -
D2PAM : Epileptic seizures prediction using adversarial deep dual patch attention mechanism
(The Institution of Engineering and Technology, 29.07.2023)
articleEpilepsy is considered as a serious brain disorder in which patients frequently experience seizures. The seizures are defined as the unexpected electrical changes in brain neural activity, which leads to unconsciousness. ... -
DC-DFFN: Densely Connected Deep Feature Fusion Network With Sign Agnostic Learning for Implicit Shape Representation
(IEEE, 11.05.2023)
articleReconstructing 3D surfaces from raw point cloud data is still a challenging and complex problem in computer vision and graphics. Recently emerged neural implicit representations model 3D surfaces implicitly in arbitrary ... -
Decidable Variable-Rate Dataflow for Heterogeneous Signal Processing Systems
(IEEE, 14.05.2020)
articleDynamic dataflow models of computation have become widely used through their adoption to popular programming frameworks such as TensorFlow and GNU Radio. Although dynamic dataflow models offer more programming freedom, they ... -
Deep belief network with fuzzy parameters and its membership function sensitivity analysis
(Elsevier, 04.11.2024)
articleOver the last few years, deep belief networks (DBNs) have been extensively utilized for efficient and reliable performance in several complex systems. One critical factor contributing to the enhanced learning of the DBN ... -
Deep Pipeline Architecture for Fast Fractal Color Image Compression Utilizing Inter-Color Correlation
(IEEE, 10.10.2022)
articleFractal compression technique is a well-known technique that encodes an image by mapping the image into itself and this requires performing a massive and repetitive search. Thus, the encoding time is too long, which is the ... -
Defining green innovation, its impact, and cycle – a literature analysis
(Elsevier, 15.11.2023)
articleOrganizations all over the globe are starting to address environmental-related matters with special emphasis. Several authors believe that for organizations to improve their corporate performance and remain competitive ... -
Depth linear discrimination-oriented feature selection method based on adaptive sine cosine algorithm for software defect prediction
(Elsevier, 20.05.2024)
articleSoftware Defect Prediction (SDP) plays a vital role in the software development life cycle as it helps identify and fix software defects. However, predicting software defects with irrelevant features and overlapping classes ... -
Design considerations of navigation satellite constellation for low Earth orbit
(IEEE, 03.10.2023)
articleIn this study we provide an overview of feasibility assessment of Low Earth Orbit Position, Timing and Navigation (LEO-PNT) satellite system. We discuss several aspects of such a design, such as signal design, accuracy ...