Haku
Aineistot 181-190 / 2133
An Automatic Sleep Scoring Toolbox : Multi-modality of Polysomnography Signals’ Processing
(SCITEPRESS Science And Technology Publications, 2019)
Sleep scoring is a fundamental but time-consuming process in any sleep laboratory. To speed up the process of sleep scoring without compromising accuracy, this paper develops an automatic sleep scoring toolbox with the ...
An Efficient and Privacy-Preserving Blockchain-Based Authentication Scheme for Low Earth Orbit Satellite Assisted Internet of Things
(Institute of Electrical and Electronics Engineers (IEEE), 2022)
Recently, integrating satellite networks (e.g. Low-earth-orbit satellite constellation) into the Internet of Things (IoT) ecosystem has emerged as a potential paradigm to provide more reliable, ubiquitous and seamless ...
An efficient cluster-based outdoor user positioning using LTE and WLAN signal strengths
(Institute of Electrical and Electronic Engineers, 2015)
In this paper we propose a novel cluster-based
RF fingerprinting method for outdoor user-equipment
(UE) positioning using both LTE and WLAN signals. It
uses a simple cost effective agglomerative hierarchical
clustering ...
An efficient functional magnetic resonance imaging data reduction strategy using neighborhood preserving embedding algorithm
(Wiley, 2022)
High dimensionality data have become common in neuroimaging fields, especially group-level functional magnetic resonance imaging (fMRI) datasets. fMRI connectivity analysis is a widely used, powerful technique for studying ...
An efficient grid-based RF fingerprint positioning algorithm for user location estimation in heterogeneous small cell networks
(IEEE, 2014)
This paper proposes a novel technique to enhance
the performance of grid-based Radio Frequency (RF) fingerprint
position estimation framework. First enhancement is an
introduction of two overlapping grids of training ...
An Efficient Network Log Anomaly Detection System using Random Projection Dimensionality Reduction
(IEEE, 2014)
Network traffic is increasing all the time and
network services are becoming more complex and vulnerable.
To protect these networks, intrusion detection systems are used.
Signature-based intrusion detection cannot find ...
An Empirical Examination of the Economics of Mobile Application Security
(Society for Management Information Systems, 2021)
The growth of mobile devices coupled with the advances in mobile technologies has resulted in the development and widespread use of a variety of mobile applications (apps). Mobile apps have been developed for social ...
An Ethical Perspective on Loot Box Purchasing : Examining Psychosocial Antecedents and the Association with Indebtedness
(University of Maribor, 2023)
Loot boxes are popular random reward mechanisms in digital games, attracting players to invest real money to enhance their gaming experiences. Loot boxes share striking similarities to gambling and might contribute to one’s ...
An experimental design for comparing interactive methods based on their desirable properties
(Springer Science+Business Media, 2024)
In multiobjective optimization problems, Pareto optimal solutions representing different tradeoffs cannot be ordered without incorporating preference information of a decision maker (DM). In interactive methods, the DM ...
An Extended Study on Training and Physical Exercise in Esports
(IGI Global, 2019)
This chapter is an extended revision of the authors' earlier study (2016) on the training routines of professional and high-level esport players, with added focus on their physical exercise. The study is methodologically ...