Browsing Department of Information and Communication Technology by Title
Now showing items 292-311 of 1283
-
Design of a VR application for pilots as a complementary tool for procedure training of Abnormal Operations
(Master thesis, 2021)The aviation industry has been amongst the early adopters of VR for educational purposes, even since the very beginning of VR’s technology establishment and throughout its further development. Flight simulators are invaluable ... -
Design of energy efficient MAC protocols in wireless sensor networks
(Master thesis, 2014)Wireless sensor networks (WSNs) have been used in variety of applications such as in military and defense, process control industry and health monitoring applications. In WSNs, sensors are in small size with limited battery ... -
Design of Multiplexers for IoT-Based Applications Using Stub-Loaded Coupled-Line Resonators
(Peer reviewed; Journal article, 2023)This paper presents the design of microstrip-based multiplexers using stub-loaded coupled-line resonators. The proposed multiplexers consist of a diplexer and a triplexer, meticulously engineered to operate at specific ... -
The Design of Sum-of-Cisoids Rayleigh Fading Channel Simulators Assuming Non-Isotropic Scattering Conditions
(Journal article; Peer reviewed, 2010)n this letter, we introduce the Riemann sum method (RSM) as an effective tool for the design of sum-of-cisoids (SOC) simulators for narrowband mobile Rayleigh fading channels under non-isotropic scattering conditions. We ... -
Design of wideband MIMO car-to-car channel models based on the geometrical street scattering model
(Journal article; Peer reviewed, 2012)We propose a wideband multiple-input multiple-output (MIMO) car-to-car (C2C) channel model based on the geometrical street scattering model. Starting from the geometrical model, a MIMO reference channel model is derived ... -
Design Requirements for a Patient Administered Personal Electronic Health Record
(Chapter; Peer reviewed, 2011) -
Design, implementation and analysis of a theft-resistant password manager based on Kamouflage architecture
(Master thesis, 2015)As a solution for helping companies and users in the constant security dilemma of obtaining and using passwords in the securest ways possible, password managers have become custom around the globe. The design architecture ... -
Designing a collaboration application for Sense Intellifield/Technology with use of contextual design
(Master thesis, 2004)Sense Technology and its branch company Sense Intellifield delivers integrated automation and information systems for the oil industry, marine and other industries. Now they are working on a project called IMEX, which ... -
Designing a framework for data populating alarms based on mitre techniques
(Master thesis, 2023)In this paper we aim to develop a proof of concept framework as a step-by-step process for identifying what type of information and log types a SOC analyst needs to analyze and handle an alarm based on the alarms MITRE ... -
Designing a framework for data populating alarms based on MITRE techniques
(Master thesis, 2023)In this paper we aim to develop a proof of concept framework as a step-by-step process for identifying what type of information and log types a SOC analyst needs to analyze and handle an alarm based on the alarms MITRE ... -
Designing for networked community resilience
(Journal article, 2016)Communities have been described to be at the heart of the preparedness for and the response to disasters. The increasing connectedness has made communities more vulnerable for their dependence on a complex network of ... -
Designing the Extended Zero Trust Maturity Model A Holistic Approach to Assessing and Improving an Organization’s Maturity Within the Technology, Processes and People Domains of Information Security
(Master thesis, 2022)Zero Trust is an approach to security where implicit trust is removed, forcing applications, workloads, servers and users to verify themselves every time a request is made. Furthermore, Zero Trust means assuming anything ... -
Designing the Extended Zero Trust Maturity Model A Holistic Approach to Assessing and Improving an Organization’s Maturity Within the Technology, Processes and People Domains of Information Security
(Master thesis, 2022)Zero Trust is an approach to security where implicit trust is removed, forcing applications, workloads, servers and users to verify themselves every time a request is made. Furthermore, Zero Trust means assuming anything ... -
DET: Data Enhancement Technique for Aerial Images
(Master thesis, 2022)Deep learning and computer vision are two thriving research areas within machine learning. In recent years, as the available computing power has grown, it has led to the possibility of combining the approaches, achieving ... -
DET: Data Enhancement Technique for Aerial Images
(Master thesis, 2022)Deep learning and computer vision are two thriving research areas within machine learning. In recent years, as the available computing power has grown, it has led to the possibility of combining the approaches, achieving ... -
Detecting and Classifying Hawaiian Monk Seal Vocalizations using Deep Learning
(Master thesis, 2022)The Hawaiian monk seal (Neomonachus schauinslandi) is one of the most endangered ma- rine mammals in the world. With an estimated population of 1,570 individuals remaining in the wild, the species have an urgent conservation ... -
Detecting and Classifying Hawaiian Monk Seal Vocalizations using Deep Learning
(Master thesis, 2022)he Hawaiian monk seal (Neomonachus schauinslandi) is one of the most endangered marine mammals in the world. With an estimated population of 1,570 individuals remaining in the wild, the species have an urgent conservation ... -
Detecting and Classifying Hawaiian Monk Seal Vocalizations using Deep Learning
(Master thesis, 2022)The Hawaiian monk seal (Neomonachus schauinslandi) is one of the most endangered marine mammals in the world. With an estimated population of 1,570 individuals remaining in the wild, the species have an urgent conservation ... -
Detecting malicious network activity using flow data and learning automata
(Master thesis, 2009)Malicious software has become an increasing problem for both businesses and home users. The traditional antivirus solutions are not always enough to detect an infection. As a result of this a lot of businesses are deploying ... -
Detecting Packed PE Files : Executable file analysis for the Windows operating system
(Master thesis, 2021)Malware authors invent new methods regularly to hide and obfuscate their code. One of these methods is known as packing. An entire program is hidden inside another executable program; however, the hidden program is usually ...