Browsing Department of Information and Communication Technology by Title
Now showing items 103-122 of 1291
-
An exact solution for the level-crossing rate and the average duration of fades of the envelope of sum-of-cisoids processes
(Journal article; Peer reviewed, 2012)Sum-of-cisoids (SOC) processes provide a physically and numerically appealing framework for the modelling and simulation of a wide class of mobile radio channels. This paper is concerned with the problem of finding a general ... -
An integrated wireless communication architecture for maritime sector
(Lecture Notes in Computer Science;6886, Chapter; Peer reviewed, 2011)The rapid evolution of terrestrial wireless systems has brought mobile users more and more desired communication services. Maritime customers are asking for the same, such as the concepts of “Broadband at Sea” and “Maritime ... -
An intelligent architecture for service provisioning in pervasive environments
(Chapter; Peer reviewed, 2011)The vision of pervasive environments is being realized more than ever with the proliferation of services and computing resources located in our surrounding environments. Identifying those services that deserve the attention ... -
An ontology-based decision support system for interventions based on monitoring medical conditions on patients in hospital wards
(Master thesis, 2014)In this project we present our research and implementation of an ontology-based clinical decision support system, which is supported by Sørlandet Sykehus Kristiansand. We discuss the generic technology of designing decision ... -
An optimal energy efficient cooperative retransmission MAC scheme in wireless networks
(Chapter; Peer reviewed, 2011)While the benefits of cooperative diversity have been well studied in the literature, cooperative MAC protocol design has also attracted much attention recently. In the single-relay Cooperative Automatic Repeat reQuest ... -
Analyse av feil og feilkorreksjonsmetoder i video over IP
(Master thesis, 2006)Ved overføring av sanntids video over et IP nettverk vil man bl.a. oppleve tap eller forsinkelse av datapakker i varierende antall, alt fra sporadiske enkeltpakker til store blokker av pakker. Man trenger derfor en metode ... -
Analysis and description of an open source janitor project
(Master thesis, 2006)The objective of this study is to describe the inside and impact of the Linux Kernel Janitor Project. To describe and discuss how such janitor activity can be useful for others is also an objective. The Linux Kernel ... -
Analysis of audio coding algorithms for networked embedded systems
(Master thesis, 2004)Today there are many different audio coding algorithms, some of them standardized by the ITU, like G.711, G.726 and G.728, and several other codecs by other organizations like Fraunhofer (mp3) and Microsoft (WMA). All these ... -
Analysis of binarization techniques and Tsetlin machine architectures targeting image classification
(Master thesis, 2020)The Tsetlin Machine is a constantly evolving and developing machine learning technique with ever-increasing success. However, for every success, the Tsetlin Machine achieves, a new set of challenges are put ahead. ... -
Analysis of load balancing and interference management in heterogeneous cellular networks
(Journal article; Peer reviewed, 2017)To meet the current cellular capacity demands, proactive offloading is required in heterogeneous cellular networks (HetCNets) comprising of different tiers of base stations (BSs), e.g., small-cell BSs (sBSs) and conventional ... -
Analysis of security for IoT : A review of architecture and cryptographic algorithms
(Master thesis, 2017)Internet of things has been a hot topic for some time now. The huge number of new devices and the limited size of these devices introduce some new problems. Recent event show a trend where IoT devices are being utilized ... -
Analysis of security in cloud platforms using OpenStack as case study
(Master thesis, 2013)In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Big companies like Amazon, Google, Microsoft etc., expand their market ... -
Analysis of the use of a workflow engine for OTRUM system software
(Master thesis, 2007)Workflow engines are attracting more and more attention. Applications based on workflow engine technology are currently developed and deployed by many companies, such as OTRUM Company. In this project, we focus on the ... -
Analysis on channel bonding/aggregation for multi-channel cognitive radio networks
(Chapter; Peer reviewed, 2010)Channel bonding/aggregation techniques, which assemble several channels together as one channel, could be used in cognitive radio networks for the purpose of achieving better bandwidth utilization. In existing work on this ... -
Analyzing the performance of transformers for streamflow prediction
(Master thesis, 2023)Within the field of hydrology, there is a vital need to be able to predict streamflow values from hydrological basins. This has traditionally been done through physics and mathematics-based models, where measured data are ... -
Anomaly detection in computer networks using hierarchically organized teams of learning automata
(Master thesis, 2011)With the increasing number of computer systems connected to the Internet, security becomes a critical issue. To combat this problem, several attack detection methods have emerged in the past years, such as the rule based ... -
Anomaly detection in dynamic systems using weak estimators
(Journal article; Peer reviewed, 2011)Anomaly detection involves identifying observations that deviate from the normal behavior of a system. One of the ways to achieve this is by identifying the phenomena that characterize “normal” observations. Subsequently, based ... -
Anomaly Detection in Traffic Surveillance Videos Using Deep Learning
(Peer reviewed; Journal article, 2022)In the recent past, a huge number of cameras have been placed in a variety of public and private areas for the purposes of surveillance, the monitoring of abnormal human actions, and traffic surveillance. The detection and ... -
Ansattes opplevelse av teknologi: Hvordan ansatte i Grimstad kommune opplever å bruke digitale samhandlingsverktøy
(Master thesis, 2022)Formålet med denne oppgaven har vært å undersøke hvordan kommunalt ansatte opplever å bruke digitale samhandlingsverktøy gjennom å se nærmere på digitale kurs, opplæring og integrering av digitale verktøy. Vi har valgt å ... -
Ansattes opplevelse av teknologi: Hvordan ansatte i Grimstad kommune opplever å bruke digitale samhandlingsverktøy
(Master thesis, 2022)Formålet med denne oppgaven har vært å undersøke hvordan kommunalt ansatte opplever å bruke digitale samhandlingsverktøy gjennom å se nærmere på digitale kurs, opplæring og integrering av digitale verktøy. Vi har valgt å ...