Selaus Oppiaineen mukaanArtikkelitTietotekniikka
Aineistot 1-20 / 86
-
A Comprehensive Survey on the Cooperation of Fog Computing Paradigm-Based IoT Applications: Layered Architecture, Real-Time Security Issues, and Solutions
(IEEE, 12.07.2023)
articleThe Internet of Things (IoT) can enable seamless communication between millions of billions of objects. As IoT applications continue to grow, they face several challenges, including high latency, limited processing and ... -
A conditioned reflex action embedded associative context learning-based energy efficient paradigm in smart city milieu
(The Institution of Engineering and Technology, 11.07.2023)
articleAn intelligent video surveillance system is crucial to enhance public safety, crime prevention, traffic, and crowd management in a smart city milieu. Situational awareness is an essential aspect of these surveillance systems ... -
A Hybrid Convolutional Neural Network Model for Automatic Diabetic Retinopathy Classification From Fundus Images
(IEEE, 01.06.2023)
articleObjective: Diabetic Retinopathy (DR) is a retinal disease that can cause damage to blood vessels in the eye, that is the major cause of impaired vision or blindness, if not treated early. Manual detection of diabetic ... -
A lightweight smart contracts framework for blockchain-based secure communication in smart grid applications
(John Wiley & SonsThe Institution of Engineering and Technology, 13.01.2024)
article -
A MapReduce Based Approach for Secure Batch Satellite Image Encryption
(IEEE, 24.05.2023)
articleThe overarching goal of this research was to examine the state of satellite imagery security in relation to its deteriorating form due to rising demand. The most common approaches to safeguarding satellite images during ... -
A Multi-GNSS Software Receiver
(Cambridge University Press, 28.10.2022)
bookPartBuild and operate multi-GNSS and multi-frequency receivers with state-of-the-art techniques using this up-to-date, thorough and easy-to-follow text. Covering both theory and practice and complemented by MATLAB© code and ... -
A Novel Deep Belief Network Architecture with Interval Type-2 Fuzzy Set Based Uncertain Parameters Towards Enhanced Learning
(Elsevier, 10.10.2023)
articleThis paper proposes a novel Deep Belief Network (DBN) architecture, the ‘Interval Type-2 Fuzzy DBN (IT2FDBN)’, which models the weights and biases with IT2 FSs. Thus, it introduces a novel algorithm for augmented deep ... -
A Robust Tuned K-Nearest Neighbours Classifier for Software Defect Prediction
(Springer, 13.12.2022)
articleIf the software fails to perform its function, serious consequences may result. Software defect prediction is one of the most useful tasks in the Software Development Life Cycle (SDLC) process where it can determine which ... -
Acceptance of Wearable Technology : A Meta-Analysis
(HICSS Conference Office University of Hawaii at Manoa, 04.01.2022)
articleKnowing what factors drive wearable technology adoption can help companies succeed in the competitive market of wearables. In this study, we conduct a meta-analysis on the relationships of technology acceptance of wearable ... -
Advanced Communication and Control Methods for Future Smart Grid
(IntechOpen, 13.07.2022)
bookPartThe reliability of intelligent electronic device (IED) function that ensures a particular disturbance will disconnect as fast enough from the healthy network to mitigate the effect of the fault is directly related to the ... -
An enhanced energy efficient protocol for large-scale IoT-based heterogeneous WSNs
(Elsevier, 01.08.2023)
articleThere is increasing attention, recently, to optimizing energy consumption in IoT-based large-scale networks. Extending the lifetime of battery-powered nodes is a key challenge in such systems and their various application ... -
Blockchain and Internet of Things in smart cities and drug supply management: Open issues, opportunities, and future directions
(Elsevier, 29.06.2023)
articleBlockchain-based drug supply management (DSM) requires powerful security and privacy procedures for high-level authentication, interoperability, and medical record sharing. Researchers have shown a surprising interest in ... -
Changing patterns in the process of digital transformation initiative in established firms : the case of an energy sector company
(Association for Information Systems (AIS), 03.06.2020)
conferenceObjectRapid digitalization and technological change are disrupting traditionally successful business models. This motivates firms to adopt new strategies based on digital technologies; such new strategies are often referred to ... -
Citizen science in information systems research : evidence from a systematic literature review
(07.01.2020)
articleCitizen science refers to partnerships between scientists and the public in scientific research. Citizen science is considered as an emerging approach for conducting research in the field of information systems (IS). However, ... -
CO2 emission based GDP prediction using intuitionistic fuzzy transfer learning
(Elsevier, 08.08.2023)
articleThe industrialization has been the primary cause of the economic boom in almost all countries. However, this happened at the cost of the environment, as industrialization also caused carbon emissions to increase exponentially. ... -
Comparison of Machine Learning algorithms for venue presence with inclusion of neighbours
(IEEE, 29.12.2021)
articleUser presence determination for being inside a venue, such that the user is provided with possible value-added services, is of high significance. It will get more prominent as we move to 5G and 6G networks’ rollout as we’ll ... -
Construction of Prioritized T-Way Test Suite Using Bi-Objective Dragonfly Algorithm
(IEEE, 06.07.2022)
articleSoftware testing is important for ensuring the reliability of software systems. In software testing, effective test case generation is essential as an alternative to exhaustive testing. For improving the software testing ... -
Cyber Intrusion Detection System Based on a Multiobjective Binary Bat Algorithm for Feature Selection and Enhanced Bat Algorithm for Parameter Optimization in Neural Networks
(IEEE, 19.07.2022)
articleThe staggering development of cyber threats has propelled experts, professionals and specialists in the field of security into the development of more dependable protection systems, including effective intrusion detection ... -
Cyberattack patterns in blockchain-based communication networks for distributed renewable energy systems : A study on big datasets
(Elsevier, 29.02.2024)
articleBlockchain-based reliable, resilient, and secure communication for Distributed Energy Resources (DERs) is essential in Smart Grid (SG). The Solana blockchain, due to its high stability, scalability, and throughput, along ... -
D2PAM : Epileptic seizures prediction using adversarial deep dual patch attention mechanism
(The Institution of Engineering and Technology, 29.07.2023)
articleEpilepsy is considered as a serious brain disorder in which patients frequently experience seizures. The seizures are defined as the unexpected electrical changes in brain neural activity, which leads to unconsciousness. ...