Blar i Faculty of Engineering and Science på tittel
Viser treff 2634-2653 av 3250
-
Scenarios for Crisis in European Critical Energy Infrastructure
(Master thesis, 2009)A sudden crisis occurrence, such as a big electricity cut, might not be regarded as an isolated incident: In almost all cases, a power outage crisis might bring about multiple losses with e.g. legal, social and economic ... -
Schauder bases and locally complemented subspaces of Banach spaces
(Master thesis, 2014)The thesis is about Schauder basis in infinite-dimensional Banach spaces and locally complemented subspaces. It starts with the notion of bases and it proves that it is equivalent with that of Schauder basis. It follows ... -
Sea lice feeding behavior of wild and hatchery lumpfish (Cyclopterus lumpus) under hatchery conditions.
(Master thesis, 2022)In 2014 Norway contributed 1.2 million tons of the world production of farmed salmon. Norway is the world’s largest producer of farmed salmon, and the species is among the top five species, quantity consumed, in the major ... -
Sea temperature effects on depth use and habitat selection in a marine fish community
(Peer reviewed; Journal article, 2021) -
Seamless Hand-over Algorithm for Wireless Enterprise Networks
(Master thesis, 2007)The mass deployment of the Institute of Electrical and Electronics Engineers’ (IEEE) 802.11 based wireless local area networks (WLAN) and increased sales in hand-held devices supporting WLAN have resulted in an urgent ... -
Searchable Privacy-Enabled Information and Event Management Solution.
(Master thesis, 2015)With network traffic proliferating over the last couple of decades, there is an increasing need to monitor security information in order to prevent and resolve network security threats. A Security Information and Event ... -
Seasonal Dynamics of Atlantic Herring (Clupea harengus L.) Populations Spawning in the Vicinity of Marginal Habitats
(Journal article; Peer reviewed, 2014)Gillnet sampling and analyses of otolith shape, vertebral count and growth indicated the presence of three putative Atlantic herring (Clupea harengus L.) populations mixing together over the spawning season February–June ... -
Seasonal dynamics of atlantic herring (Clupea harengus L.) populations spawning in the vicinity of marginal habitats
(Journal article; Peer reviewed, 2014)Gillnet sampling and analyses of otolith shape, vertebral count and growth indicated the presence of three putative Atlantic herring (Clupea harengus L.) populations mixing together over the spawning season February–June ... -
Second-order hydrodynamic effects on the response of three semisubmersible floating offshore wind turbines
(Journal article; Peer reviewed, 2020) -
Secondary Control of a Digital Hydraulic Motor for Winch Applications
(Master thesis, 2018)The reliable traditional hydraulic systems for industrial purposes is being challenged by an emerging technology called digital hydraulics. This technology shows promising improvements in regards to e ciency, especially ... -
Secure and Efficient Data Storage in Unattended Wireless Sensor Networks
(Journal article; Peer reviewed, 2009)Providing forward and backward secrecy is still a big challenge in Unattended Wireless Sensor Networks (UWSNs), though some storage schemes have been proposed. Additionally, high storage requirement needs efficient storage ... -
Secure and scalable dataprocessing and communications for an Animal Tracking System
(Master thesis, 2003)Modern technology is constantly being employed in new fields, by new industries and people. The cost of advanced technological equipment decreases continously, and equipment that was reserved for people and corporations ... -
Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications
(Peer reviewed; Journal article, 2023)One of the most significant recent advances in technology is the advent of unmanned aerial vehicles (UAVs), i.e., drones. They have widened the scope of possible applications and provided a platform for a wide range of ... -
Secure Group Communication Using Fractional Public Keys
(Chapter; Peer reviewed, 2010)In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement scheme that is based on fractional public keys. Shared group keys are computed ... -
Secure interworking with P2PSIP and IMS
(Academic article, 2010)In this paper, we propose a secure system model for interconnection between P2PSIP and IMS domains. The interworking solution is based on P2P-IMS GateWay (PIGW), which acts as a normal peer in P2PSIP network and a 3. party ... -
Secure multi-party based cloud computing framework for statistical data analysis of encrypted data
(Master thesis, 2013)Secure Multi-party Computation (SMC) is a paradigm used to accomplish a common computation among multiple users while keeping the data of each party secret from others. In recent years there has been a keen interest among ... -
Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks
(Journal article; Peer reviewed, 2010)In unattended wireless sensor networks (UWSNs), sensed data are stored locally or at designated nodes and further accessed by authorized collectors on demand. This paradigm is motivated by certain scenarios where historical ... -
Securing Assets with RFID
(Master thesis, 2008)Loss of property is something every company has had to deal with at some point, without proper securing this is a problem that is very hard to get control of. RFID has been available for decades but it has been a technology ... -
Security and Privacy Assessment for Medical Technical Devices: A Playbook for Evaluating Cybersecurity and Privacy
(Master thesis, 2023)This thesis presents a detailed assessment methodology for medical devices that use Bluetooth connectivity, incorporating both technical and privacy considerations. The framework, referred to as the playbook, provides a ... -
Security and privacy for wireless ad-hoc networks
(Master thesis, 2006)The common belief of that mobile network makes security and privacy more difficult to establish is not always correct. Also the fact that several types of wireless technology make nodes vulnerable to monitoring and ...