• Automatic Unsupervised Clustering of Videos of the Intracytoplasmic Sperm Injection (ICSI) Procedure 

      Storås, Andrea; Riegler, Michael Alexander; Haugen, Trine B.; Thambawita, Vajira L B; Hicks, Steven Alexander; Hammer, Hugo Lewi; Kakulavarapu, Radhika; Halvorsen, Pål; Stensen, Mette Haug (Chapter; Conference object, 2023)
      The in vitro fertilization procedure called intracytoplasmic sperm injection can be used to help fertilize an egg by injecting a single sperm cell directly into the cytoplasm of the egg. In order to evaluate, refine and ...
    • Cognitive Robotics - Towards the Development of Next-Generation Robotics and Intelligent Systems 

      Zouganeli, Evi; Lentzas, Athanasios (Chapter; Conference object, 2023)
      In this paper we make the case for cognitive robotics, that we consider a prerequisite for next generation systems. We give a brief account of current cognition-enabled systems, and viable cognitive architectures, discuss ...
    • Conceptualization and scalable execution of big data workflows using domain-specific languages and software containers 

      Nikolov, Nikolay; Dessalk, Yared Dejene; Khan, Akif Quddus; Soylu, Ahmet; Matskin, Mihhail; Payberah, Amir; Roman, Dumitru (Internet of Things;Volume 16, December 2021, 100440, Peer reviewed; Journal article, 2021-11-26)
      Big Data processing, especially with the increasing proliferation of Internet of Things (IoT) technologies and convergence of IoT, edge and cloud computing technologies, involves handling massive and complex data sets on ...
    • Enhancing investigative interview training using a child avatar system: a comparative study of interactive environments 

      Zohaib Hassan, Syed; Shafiee Sabet, Saeed; Riegler, Michael Alexander; Baugerud, Gunn Astrid; Ko, Hayley Manalang; Salehi, Pegah; Røed, Ragnhild Klingenberg; Sinkerud Johnson, Miriam; Halvorsen, Pål (Peer reviewed; Journal article, 2023)
      The impact of investigative interviews by police and Child Protective Services (CPS) on abused children can be profound, making effective training vital. Quality in these interviews often falls short and current training ...
    • An overview of artificial intelligence used in malware 

      Fritsch, Lothar; Alzarqawee, Aws Naser Jaber; Yazidi, Anis (Chapter; Conference object, 2023)
      Artificial intelligence (AI) and machine learning (ML) methods are increasingly adopted in cyberattacks. AI supports the establishment of covert channels, as well as the obfuscation of malware. Additionally, AI results in ...