Blar i Faculty of Engineering and Science på tittel
Viser treff 7-26 av 3182
-
A battery and network usage model for smartphones
(Master thesis, 2012)Smartphones have emerged into platforms with powerful computational capabilities that generate large amount of data. Smartphones have become an important part of our daily life and we use smartphones more frequently than ... -
A Case Study of the Technology Use and Information Flow at a Hospital-driven Telemedicine Service
(Journal article; Peer reviewed, 2017)Health care services face the challenge of providing individualised treatment to a growing ageing population prone to chronic conditions and multi-morbidities. The research project Patients and Professionals in Productive ... -
A Churn prediction model based on gaussian processes
(Master thesis, 2013)The telecommunication’s market has changed to a saturated one during the past few years. This makes it relatively costly to acquire new customers than to retain existing ones. Recent research has further showed that ... -
A Cluster Analysis of Stock Market Data Using Hierarchical SOMs
(Chapter; Peer reviewed, 2016)The analysis of stock markets has become relevant mainly because of its financial implications. In this paper, we propose a novel methodology for performing a structured cluster analysis of stock market data. Our proposed ... -
A co-writing development approach to wikis: Pedagogical issues and implications
(Journal article; Peer reviewed, 2011)Wikis are promoted as collaborative writing tools that allow students to transform a text into a collective document by information sharing and group reflection. However, despite the promising collaborative capabilities ... -
A collaborative writing approach to wikis: Design, implementation, and evaluation
(Journal article; Peer reviewed, 2011)Wikis provide teachers with potentially significant opportunities for creating socially engaged tasks that require active student participation and collaboration. Wikis allow students to work together to develop content ... -
A comparison of database systems for rapid search results in large amounts of leaked data
(Master thesis, 2019)A large portion of the information on the Internet is stored in databases, since databases arethe natural place among online services for storage of user information. Hackers occasionallybreach web sites and publish ... -
A Comprehensive Framework for Patching and Vulnerability Management in Enterprises
(Master thesis, 2023)As patching and vulnerability management have become a larger part of an organization's routine, its need for proper integration and complexity toward systems has increased. Threat actors continuously seek to develop and ... -
A Comprehensive Framework for Patching and Vulnerability Management in Enterprises
(Master thesis, 2023)As patching and vulnerability management have become a larger part of an organization's routine, its need for proper integration and complexity toward systems has increased. Threat actors continuously seek to develop and ... -
A computational method to optimal control of a wind turbine system using wavelets
(Chapter; Peer reviewed, 2011)This paper deals with a computational optimization approach to the problem of state-feedback control design for a wind turbine system. The first step of the study is to develop a reduced order model for the system by ... -
A critical review on supply chain risk - Definition, measure and modeling
(Journal article; Peer reviewed, 2015) -
A critical view on temperature modelling for application in weather derivatives markets
(Journal article, 2012) -
A Damage Identification Approach for Offshore Jacket Platforms Using Partial Modal Results and Artificial Neural Networks
(Journal article; Peer reviewed, 2018)This paper presents a damage identification method for offshore jacket platforms using partially measured modal results and based on artificial intelligence neural networks. Damage identification indices are first proposed ... -
A data-based approach for modeling and analysis of vehicle collision by LPV-ARMAX models
(Journal article; Peer reviewed, 2013)Vehicle crash test is considered to be the most direct and common approach to assess the vehicle crashworthiness. However, it suffers from the drawbacks of high experiment cost and huge time consumption. Therefore, the ... -
A Deep Learning Approach for Recognizing Daily Movement Patterns through Accelerometer Data
(Master thesis, 2018)Physical activity is a key factor in the treatment of chronic diseases such asdiabetes, cardiovascular disease, and depression. Doctors and personal trainershave limited methods to accurately monitor and classify a patients ... -
A DEEP LEARNING SEGMENTATION APPROACH FOR AUTOMATIC INVOICE IDENTIFICATION
(Master thesis, 2019)The research on object detection has come a long way and has in recent years become so efficient andreliable that we see many practical applications in simple detection of objects in pictures to advancesegmentation in video ... -
A deep learning segmentation approach to calories and weight estimation of food images
(Master thesis, 2019)Today’s generation is very aware of what they are eating and the amountof calories in their food. Eating too many calories can lead to increasedweight, which has become a big health issue. A study from 2016 ... -
A Digital Twin framework for multi-objective optimization
(Master thesis, 2023)This thesis represents the culmination of the Msc civil engineering course at the University of Agder. This thesis aims to attempt to define a framework for implementing digital twins in an investment cost/energy consumption ... -
A Dynamic Framework Enhancing Situational Awareness in Cybersecurity SOC—IR
(Master thesis, 2022)Organizations today face a significant challenge in protecting their valuable IT assets. Cyber criminals unlimited to physical boundaries are able to disrupt and destroy cyber infrastructure, deny organizations access to ... -
A Dynamic Framework Enhancing Situational Awareness in Cybersecurity SOC—IR
(Master thesis, 2022)Organizations today face a significant challenge in protecting their valuable IT assets. Cyber criminals unlimited to physical boundaries are able to disrupt and destroy cyber infrastructure, deny organizations access to ...