Blar i Department of Information and Communication Technology på tittel
Viser treff 1061-1080 av 1291
-
Simulations of networked critical infrastructures
(Master thesis, 2018)Critical infrastructure (CI) refers to assets that are essential for the functioning of a society and economy, such as telecommunication/ICT; energy generation, transmission and distribution; financial sector; etc. CIs are ... -
A Single radio based channel datarate-aware parallel rendezvous MAC protocol for cognitive radio networks
(Journal article; Peer reviewed, 2009)Channel hopping based parallel rendezvous multichannel MAC protocols have several advantages since they do not need a control channel, require only one transceiver, and produce higher system capacity. However, channel ... -
Single-channel speech enhancement using implicit Wiener filter for high-quality speech communication
(Peer reviewed; Journal article, 2022)Speech enables easy human-to-human communication as well as human-to-machine interaction. However, the quality of speech degrades due to background noise in the environment, such as drone noise embedded in speech during ... -
SIP based IP-telephony network security analysis
(Master thesis, 2004)This thesis evaluates the SIP Protocol implementation used in the Voice over IP (VoIP) solution at the fibre/DSL network of Èlla Kommunikasjon AS. The evaluation focuses on security in the telephony service, and is ... -
Skalerbar og QoS-bevisst arkitektur for innholdsbasert distribusjon av store mengder data over WAN
(Master thesis, 2005)Vi ser stadig at data som overføres på Internett øker, både i form av antall og størrelse. Ettersom uønskede pakker er blitt et økende problem, er det utviklet systemer som ruter pakkene kun til ønskelig mottaker ved hjelp ... -
Slaying the SA-Demons – Humans vs. Technology – A Content analysis
(Chapter, 2021)This paper examines Situation Awareness (SA) and the application of Endsley’s SA-Demons in different contexts and research areas. We perform content analysis to examine how they are used, and to what degree they are perceived ... -
SleepXAI: An explainable deep learning approach for multi-class sleep stage identification
(Peer reviewed; Journal article, 2022)Extensive research has been conducted on the automatic classification of sleep stages utilizing deep neural networks and other neurophysiological markers. However, for sleep specialists to employ models as an assistive ... -
Smart monitoring the health of dogs: a proof of concept
(Master thesis, 2022)English: This master thesis discusses the conceptualization of a smart health monitor device for dogs. The dog owner will in theory be able to monitor the dog’s well-being through their smartphone. The author of the thesis ... -
Smartkort og Windows 2000
(Master thesis, 2000)Sikkerhet er et viktig tema innenfor alle datasystemer, ikke minst i forbindelse med Internett. Internett åpner nye muligheter, men medfører også at datasystemene blir mer sårbare. Utfordringen for dagens datasystemer ... -
Smartphone usage among older adults
(Peer reviewed; Journal article, 2021) -
The SmartSight Project: Use of Electronic Glasses to Improve Impaired Fields of Vision
(Peer reviewed; Journal article, 2020)Electronic glasses use advanced assistive technology that can improve function for persons with visual impairments. This paper presents work in progress in the SmartSight project, where existing versions of electronic ... -
Smooth and Consistent Video Anonymization Using Triangular Inpainting and Optical Flow
(Master thesis, 2022)Surveillance cameras have been deployed extensively in big cities, such as London and Shanghai. To protect people’s privacy and avoid fully exposed, it is necessary to remove sensitive facial information in the surveillance ... -
Smooth and Consistent Video Anonymization Using Triangular Inpainting and Optical Flow
(Master thesis, 2022)Surveillance cameras have been deployed extensively in big cities, such as London and Shanghai. To protect people’s privacy and avoid fully exposed, it is necessary to remove sensitive facial information in the surveillance ... -
SNOMED on FHIR Transmission of clinical data with the Fast Healthcare Interoperability Resources protocol (HL7-FHIR) utilizing Systematized Nomenclature of Medicine - Clinical Terms (SNOMED-CT)
(Master thesis, 2019)The exchange of information at the level of semantic interoperability needs some infor-mation model and clinical terminology work together. Electronic records of the patientmust include the terminologies in order to give ... -
Social Media Data in an Augmented Reality System for Situation Awareness Support in Emergency Control Rooms
(Peer reviewed; Journal article, 2021)During crisis situations, emergency operators require fast information access to achieve situation awareness and make the best possible decisions. Augmented reality could be used to visualize the wealth of user-generated ... -
Software Development Process Improvement in Datacom Platform
(Master thesis, 2008)Ericsson Mobile Platform (EMP) is responsible of the development of a software platform and also to some extend responsible for related hardware parts. EMP is developing the data communication parts of the platform which ... -
Software testing: A case study of a small Norwegian software team
(Master thesis, 2012)(Konfidensiell til/confidential until 01.07.2017) -
Solving dynamic bandit problems and decentralized games using the kalman bayesian learning automaton
(Master thesis, 2010)Multi-armed bandit problems have been subject to a lot of research in computer science because it captures the fundamental dilemma of exploration versus exploitation in reinforcement learning. The goal of a bandit problem ... -
Solving Multiconstraint Assignment Problems Using Learning Automata
(Journal article; Peer reviewed, 2010)This paper considers the NP-hard problem of object assignment with respect to multiple constraints: assigning a set of elements (or objects) into mutually exclusive classes (or groups), where the elements which are ... -
Solving Non-Stationary Bandit Problems by Random Sampling from Sibling Kalman Filters
(Lecture Notes in Computer Science ; 6098, Chapter; Peer reviewed, 2010)The multi-armed bandit problem is a classical optimization problem where an agent sequentially pulls one of multiple arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions ...