Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Multi-criteria decision-making model based on picture hesitant fuzzy soft set approach: An application of sustainable solar energy management
Information Sciences: an International Journal (ISCI), Volume 686, Issue Chttps://doi.org/10.1016/j.ins.2024.121334AbstractThis study addresses the optimization of energy management within corporations to reduce expenditures and maximize profits. Focusing on proactive, coordinated, and systematic energy usage, the research emphasizes the importance of informed ...
- research-articleJuly 2024
Bridging theory and practice: A comprehensive algorithm for imageless total knee arthroplasty
Computers in Biology and Medicine (CBIM), Volume 177, Issue Chttps://doi.org/10.1016/j.compbiomed.2024.108662AbstractTotal knee arthroplasty (TKA) is a surgical procedure to treat severe knee osteoarthritis. Among several techniques available for performing TKA, imageless TKA is known for achieving precise alignment while minimizing invasiveness. This work ...
Graphical abstractDisplay Omitted
Highlights- A simplified surgical algorithm is presented.
- Pseudo-codes are provided for reproducibility.
- Dual verification is conducted in virtual and experimental setups.
- Optimized surgery is achievable with the proposed algorithm.
- research-articleSeptember 2023
Femoral coordinate system based on articular surfaces: Implications for computer-assisted knee arthroplasty
Computers in Biology and Medicine (CBIM), Volume 163, Issue Chttps://doi.org/10.1016/j.compbiomed.2023.107229AbstractOsteoarthritis knee can be restored by total knee arthroplasty (TKA). Imageless TKA requires several anatomical points to construct a reference coordinate system to measure bone resections and implant placement. Inaccuracies in the definition of ...
Graphical abstractDisplay Omitted
Highlights- Articular arcs, primarily marked to register resection points, are reutilized.
- 3D articular arc of distal femur is transformed to 2D by a unique coordinate system.
- Turning points of the arcs define a transverse axis for imageless ...
- research-articleAugust 2023
Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices
AbstractThe Internet of Things (IoT) technologies continuously expand with time due to the advances in automated, connected device technology, mobility, and wide access to information. IoT is the collection of many linked devices due to their unique ...
- research-articleDecember 2022
Tensor ring with alternative change mask for multitemporal hyperspectral image change detection
Pattern Recognition Letters (PTRL), Volume 164, Issue CPages 46–52https://doi.org/10.1016/j.patrec.2022.10.023Highlights- The proposed method, TRACM-CD leverages tensor ring to extract temporal-symmetric features in multitemporal HSIs.
Multitemporal hyperspectral image (HSI) change detection (CD) is a prevalent topic in remote sensing image processing. HSI CD usually consists of change feature extraction and classification. Although the high dimensionality of HSIs ...
-
- research-articleMarch 2022
A blockchain‐based privacy‐preserving authentication system for ensuring multimedia content integrity
International Journal of Intelligent Systems (IJIS), Volume 37, Issue 5Pages 3050–3071https://doi.org/10.1002/int.22830AbstractWith the prevalence of digital cameras, multimedia data have been used to record facts and provide evidence of events. However, the integrity of multimedia data is vulnerable to attacks with the proliferation of data tampering tools. In fact, an ...
- research-articleSeptember 2021
A Dataset Generation Tool for Deep learning-based Motion Planning in Complex Environments
2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA )Pages 1–4https://doi.org/10.1109/ETFA45728.2021.9613554Learning-based approaches for motion planning have gained much attention. These approaches show better performance in terms of computational efficiency as compared to the tradition approaches, such as sampling-based motion planning. One of the key ...
- research-articleOctober 2021
A Tensor Train Based Change Detection Method for Multitemporal Hyperspectral Images
PRIS '21: Proceedings of the 2021 International Conference on Pattern Recognition and Intelligent SystemsPages 68–71https://doi.org/10.1145/3480651.3480666Remote sensing change detection (CD) using multitemporal hyperspectral images (HSI) is a process of extraction of change features and classification. However, the high dimensionality of HSI not only leads to expensive computation but also suffers from ...
- correctionMay 2021
Correction to: Elastic caching solutions for content dissemination services of ip-based internet technologies prospective
Multimedia Tools and Applications (MTAA), Volume 80, Issue 11Page 17023https://doi.org/10.1007/s11042-020-09990-4The article title in the original publication of this article contains a mistake.
- research-articleMay 2021
Elastic caching solutions for content dissemination services of ip-based internet technologies prospective
Multimedia Tools and Applications (MTAA), Volume 80, Issue 11Pages 16997–17022https://doi.org/10.1007/s11042-020-09626-7AbstractThe Information-Centric Networking (ICN) provides a new data dissemination Internet paradigm to support the communication services that will meet the end-users’ modern requirements. ICN focuses on transmitting data rather than physical locations. ...
- research-articleJanuary 2021
Exploration of Temperature-Dependent Thermal Conductivity and Diffusion Coefficient for Thermal and Mass Transportation in Sutterby Nanofluid Model over a Stretching Cylinder
This declaration ponders the impacts of Joule warm, separation, and warming radiation for the progression of MHD Sutterby nanofluid past over an all-inclusive chamber. The wonder of warmth and mass conduction is demonstrated under warm conductivity ...
- ArticleDecember 2020
A Methodology to Automate the Security Patterns Selection
- Khudema Zahra,
- Shahid Hussain,
- Humaira Afzal,
- Muhammad Rafiq Mufti,
- Dost Muhammad Khan,
- Muhammad Khalid Sohail
Security, Privacy, and Anonymity in Computation, Communication, and StoragePages 408–419https://doi.org/10.1007/978-3-030-68851-6_30AbstractSecurity has become an important issue for software systems. The numbers of threats are advancing day by day making it more challengeable to cope with it. During the software development life cycle (especially security oriented applications) it is ...
- research-articleJanuary 2020
On Behavioral Response of Microstructural Slip on the Development of Magnetohydrodynamic Micropolar Boundary Layer Flow
In this paper, the concept of microstructural slip is introduced in the flow of micropolar fluids pertinent to model various physical situations. The flow is modeled by a set of PDEs which are transformed to a nonlinear system of ODEs by employing ...
- research-articleJanuary 2020
On Behavioral Response of 3D Squeezing Flow of Nanofluids in a Rotating Channel
In this article, a behavioral study of three-dimensional (3D) squeezing flow of nanofluids with magnetic effect in a rotating channel has been performed. Using Navier–Stokes equations along with suitable similarity transformations, a nonlinear coupled ...
- ArticleOctober 2019
Unpaired Multi-contrast MR Image Synthesis Using Generative Adversarial Networks
AbstractMagnetic Resonance Imaging (MRI) has been established as an important diagnostic tool for research and clinical purposes. Multi-contrast scans can enhance the accuracy for many deep learning algorithms. However, these scans may not be available in ...
- research-articleSeptember 2019
Reducing the Computational Complexity and Improve Performance of Enhanced K-best SDA Using Spatial Modulation MIMO System
WSSE '19: Proceedings of the 1st World Symposium on Software EngineeringPages 42–46https://doi.org/10.1145/3362125.3362131Spatial Modulation(SM) is a technique that offers reliability and energy efficiency for MIMO systems. The main two challenges SM is designed an algorithm reducing the computational complexity and detect the error at the receiving side to give the ...
- research-articleMay 2019
Multi‐hop interpersonal trust assessment in vehicular ad‐hoc networks using three‐valued subjective logic
IET Information Security (ISE2), Volume 13, Issue 3Pages 223–230https://doi.org/10.1049/iet-ifs.2018.5336Future vehicular networks need multi‐hop trusted information among car manoeuvres as a solution to the persistent problem of road safety, and news sharing. However, malicious users in vehicular networks can also disseminate fake information among each ...
- research-articleJuly 2016
Performance analysis of passive optical networks with energy saving through the integrated sleep mode
Optical Switching and Networking (OSAN), Volume 21, Issue CPages 16–30https://doi.org/10.1016/j.osn.2015.12.002Improving the energy efficiency has become an important aspect of designing optical access networks to minimize their carbon footprints. In this context, interleaved polling with adaptive cycle time (IPACT) with the integrated sleep mode is considered ...
- articleJune 2014
Web Support System for Business Intelligence in Small and Medium Enterprises
Wireless Personal Communications: An International Journal (WPCO), Volume 76, Issue 3Pages 535–548https://doi.org/10.1007/s11277-014-1723-1Last decade belongs to business intelligence (BI) because it is one of the few concepts that have actually lived to the expectations. Not only the businesses have adopted it but also have reaped the fruits out of it. But the cost of BI solutions is very ...
- articleNovember 2010
Design, implementation and testing of electrostatic SOI MUMPs based microgripper
Microsystem Technologies (MITE), Volume 16, Issue 11Pages 1957–1965This paper presents a detail modeling, finite element analysis and testing results of MEMS based electrostatically actuated microgripper. Interdigitated lateral comb pairs have been used to actuate the microgripper. The microgripper is optimized using ...