Browsing Department of Information and Communication Technology by Title
Now showing items 1137-1156 of 1275
-
The fundamental theory of optimal "Anti-Bayesian" parametric pattern classification using order statistics criteria
(Journal article; Peer reviewed, 2013)The gold standard for a classifier is the condition of optimality attained by the Bayesian classifier. Within a Bayesian paradigm, if we are allowed to compare the testing sample with only a single point in the feature ... -
The Hierarchical Continuous Pursuit Learning Automation for Large Numbers of Actions
(Chapter; Peer reviewed, 2018) -
The Impact of Gender Equality in the Cybersecurity Sector
(Master thesis, 2023)Nowadays, there is a shortage of cybersecurity professionals in the sector and women are disproportionately underrepresented in the field. This exploratory study examines how organizations can retain and entice women in ... -
The Impact of Gender Equality in the Cybersecurity Sector
(Master thesis, 2023)Nowadays, there is a shortage of cybersecurity professionals in the sector and women are disproportionately underrepresented in the field. This exploratory study examines how organizations can retain and entice women in ... -
The Impact of Human Walking on the Time-Frequency Distribution of In-Home Radio Channels
(Chapter; Peer reviewed, 2018) -
The impact of shadowing and the severity of fading on the first and second order statistics of the capacity of OSTBC MIMO Nakagami-lognormal channels
(Journal article; Peer reviewed, 2011)This article presents a thorough statistical analysis of the capacity of orthogonal space-time block coded (OSTBC) multiple-input multiple-output (MIMO) Nakagami- lognormal (NLN) channels. The NLN channel model allows to ... -
The impact of spatial correlation on the statistical properties of the capacity of Nakagami-m channels with MRC and EGC
(Journal article; Peer reviewed, 2011)In this article, we have studied the statistical properties of the instantaneous channel capacitya of spatially correlated Nakagami-m channels for two different diversity combining methods, namely maximal ratio combining ... -
The Maritime Pickup and Delivery Problem with Cost and Time Window Constraints : System Modeling and A* Based Solution
(Master thesis, 2019)In the ship chartering business, more and more shipment ordersare based on pickup and delivery in an on-demand manner ratherthan conventional scheduled routines. In this situation, it is nec-essary to ... -
The Potential and Limitations of the Tsetlin Machine in Model-Free Reinforcement Learning
(Master thesis, 2023)This paper aims to investigate the potential of model-free reinforcement learning using the Tsetlin Machine by evaluating its performance in widely recognized benchmark environments for reinforcement learning: Cartpole and ... -
The Potential and Limitations of the Tsetlin Machine in Model-Free Reinforcement Learning
(Master thesis, 2023)This paper aims to investigate the potential of model-free reinforcement learning using the Tsetlin Machine by evaluating its performance in widely recognized benchmark environments for reinforcement learning: Cartpole and ... -
The Science and Art of Chaotic Pattern Recognition
(Chapter; Peer reviewed, 2016) -
The Technology Use and Information Flow at a Municipal Telemedicine Service
(Journal article; Peer reviewed, 2018)Health care services face challenges with providing individualised treatment to an ageing population prone to chronic conditions and multi-morbidities. The research project Patients and Professionals in Productive Teams ... -
Thompson sampling guided stochastic searching on the line for deceptive environments with applications to root-finding problems
(Peer reviewed; Journal article, 2019) -
Threat to information security : the system vulnerability and denial of service attacks
(Master thesis, 2004)The use of the Internet has increased drastically the last few years. This trend has led to a constant increase in attacks toward computer systems and networks, and the methods for attacking are becoming more and more ... -
Throughput and delay analysis of HARQ with code combining over double Rayleigh fading channels
(Journal article; Peer reviewed, 2018) -
Throughput and energy efficiency comparison of one-hop, two-hop, virtual relay and cooperative retransmission schemes
(Chapter; Peer reviewed, 2010)Two main types of approaches exist for implementing cooperative communications at the MAC layer: virtual-hop relay and cooperative retransmission. While the virtual-hop relay schemes employ relay nodes to forward packets ... -
Time estimation for large scale of data processing in Hadoop MapReduce scenario
(Master thesis, 2011)The appearance of MapReduce technology gave rise to a strong blast in IT industry. Large companies such as Google, Yahoo and Facebook are using this technology to facilitate their data processing[12]. As a representative ... -
To Deceive or not Deceive: Unveiling The Adoption Determinants Of Defensive Cyber Deception in Norwegian Organizations
(Master thesis, 2023)Due to the prevailing threat landscape in Norway, it is imperative for organizations to safe- guard their infrastructures against cyber threats. One of the technologies that is advan- tageous against these threats is ... -
To Deceive or not Deceive: Unveiling The Adoption Determinants Of Defensive Cyber Deception in Norwegian Organizations
(Master thesis, 2023)Due to the prevailing threat landscape in Norway, it is imperative for organizations to safeguard their infrastructures against cyber threats. One of the technologies that is advantageous against these threats is defensive ... -
Topology Design to Increase Network Lifetime in WSN for Graph Filtering in Consensus Processes
(European Signal Processing Conference (EUSIPCO);25 2017, Journal article; Peer reviewed, 2017)Graph filters, which are considered as the workhorses of graph signal analysis in the emerging field of signal processing on graphs, are useful for many applications such as distributed estimation in wireless sensor networks. ...