-
101
-
102
3D deployment of UAVs in wireless networks for traffic offloading and edge computing. (c2019)
Published 2019“…Unmanned aerial vehicles (UAVs) have recently emerged as enablers for mul- titude use cases in 5G networks leading to interesting industrial and business applications. 5G networks envision a multi-service network promoting various applications with a distinct set of performance and service demands. …”
Get full text
Get full text
Get full text
masterThesis -
103
A hybrid cryptosystem based on WEP for 802.11 networks
Published 2006Get full text
Get full text
Get full text
article -
104
Applications of artificial intelligence in ultrasound imaging for carpal-tunnel syndrome diagnosis: a scoping review
Published 2025“…The majority of studies utilized deep learning approaches, particularly CNNs (<i>n</i> = 15), and some focused on radiomics features (<i>n</i> = 5) and traditional machine learning techniques.…”
-
105
Multigrid solvers in reconfigurable hardware. (c2006)
Published 2006Get full text
Get full text
masterThesis -
106
On Equivalent Circuit Model-Based State-of-Charge Estimation for Lithium-Ion Batteries in Electric Vehicles
Published 2025“…A third-order equivalent circuit model is employed for the LIB based on electrochemical impedance spectra test results, with model parameters identified using a particle swarm optimization algorithm. Two real-time model-based estimation algorithms, Extended Kalman Filter (EKF) and Unscented Kalman Filter (UKF), are compared for SoC estimation. …”
-
107
Validation of plasma protein glycation and oxidation biomarkers for the diagnosis of autism
Published 2023“…The test had 88% accuracy in children 5–12 years old. Herein, we present an international multicenter clinical validation study (N = 478) with application of similar biomarkers to a wider age range of 1.5–12 years old children. …”
-
108
-
109
Autonomous 3D Deployment of Aerial Base Stations in Wireless Networks with User Mobility
Published 2019“…We present performance results for the algorithm as a function of various system parameters assuming a random walk mobility model. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
110
-
111
An effective design system for dynamically reconfigurable architectures
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
112
An improved kernel for the undirected planar feedback vertex set problem
Published 2017“…We consider the parameterized Feedback Vertex Set problem on unweighted, undirected planar graphs. We present a kernelization algorithm that takes a planar graph G and an integer k as input and either decides that (G,k) is a no instance or produces an equivalent (kernel) instance (G′,k′) such that k′ ≤ k and |V(G′)| < 97k. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
113
Data redundancy management for leaf-edges in connected environments
Published 2022“…DRMF considers both static and mobile edge devices, and provides two algorithms for temporal and spatio-temporal redundancy detection. …”
Get full text
Get full text
Get full text
Get full text
article -
114
A Blockchain Model for Secure Communications in Internet of Vehicles
Published 2021“…In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
115
R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks
Published 2025“…The first algorithm presents a novel data leakage method that efficiently exploits convolutional layer gradients, demonstrating that even with non-fully invertible activation functions, such as ReLU, training samples can be analytically reconstructed directly from gradients without the need to reconstruct intermediate layer outputs. …”
-
116
Real-Time Social Robot’s Responses to Undesired Interactions Between Children and their Surroundings
Published 2022“…In this study, we evaluate the performance of five machine learning techniques in characterizing five possible undesired interactions between a child and a social robot. …”
-
117
Regression Testing of Database Applications
Published 2002Get full text
Get full text
Get full text
article -
118
Peak Loads Shaving in a Team of Cooperating Smart Buildings Powered Solar PV-Based Microgrids
Published 2021“…<p>This paper presents a scheduling framework based algorithm for reducing/shaving the peak loads in a team of cooperating microgrids (TCM) powered smart buildings taking advantages of vehicle-to-building (V2B) concept and operational flexibilities of electric vehicles (EVs). …”
-
119
-
120
Lung nodule classification utilizing support vector machines
Published 2002“…The sensitivity of SVM classifier is found to be 87.5%. We intend to automate the pre-processing detection process to further enhance the overall classification.…”
Get full text
Get full text
article