Blar i Department of Information and Communication Technology på tittel
Viser treff 173-192 av 1273
-
Bruk av AR-applikajson som verktøy på boligvisning
(Master thesis, 2022)Denne masteroppgaven undersøker bruk av Augmented Reality (AR) som et verktøy på boligvisning. Det har vært et stort problem i eiendomsbransjen med klager i forbindelse med boligkjøp. Kjøpere har høye forventninger som ... -
Bruk av AR-applikajson som verktøy på boligvisning
(Master thesis, 2022)Denne masteroppgaven undersøker bruk av Augmented Reality (AR) som et verktøy på boligvisning. Det har vært et stort problem i eiendomsbransjen med klager i forbindelse med boligkjøp. Kjøpere har høye forventninger som ... -
Bruk av Honeynett for å analysere trusler mot datanettverk
(Master thesis, 2002)Denne oppgaven er et studie i hvordan bruke et Honeynett som et verktøy for å observere og analysere de trusler som dag finnes på Internett. Det ble først foretatt et litteraturstudium, både teknisk om Honeynett-teknologi ... -
Bruk av Honeypot-konseptet for å øke sikkerheten i nettverket
(Master thesis, 2000)De siste årenes kraftige vekst i nettverksbaserte tjenester, har ført til at datasikkerhet er blitt en stadig viktigere del av organisasjonenes IT-strategi. Et av de viktigste midlene i kampen mot datakriminalitet er ... -
Bruk av RDF til kobling av RFID-baserte metadata til kvalitetssikring hos Agder renovasjon
(Master thesis, 2005)Resource Description Framework (RDF) er et rammeverk som blir standardisert av W3C. Rammeverket brukes til å beskrive og koble sammen ressurser ved hjelp av subjekt, egenskap og objekt. I denne oppgaven har vi benyttet ... -
Buffering principles for mobile multimedia over IP
(Master thesis, 2001)This thesis suggests a test-bed for reviewing queue algorithms suitable for IP based mobile multimedia services. Subjective performance quality obtained in the test-bed was analysed using a network performance monitor ... -
Building Concise Logical Patterns by Constraining Tsetlin Machine Clause Size
(Academic article, 2023)Tsetlin machine (TM) is a logic-based machine learning approach with the crucial advantages of being transparent and hardware-friendly. While TMs match or surpass deep learning accuracy for an increasing number of applications, ... -
Building nursing statements based on ICNP
(Master thesis, 2013)Correct and professional use of the nursing termonology is important to assure quality information in the nursing practice. The International Classification for Nursing Practice(ICNP) is a unified language system which ... -
Camera functionality in modern mobile terminals : software FIR filter for demosaicing with RISC
(Master thesis, 2001)This thesis discusses implementation and optimizing of the image pre-processing operation demosaicing on a typical hardware architecture for mobile terminals. Work has shown that the demosaicing operation is equivalent ... -
Can Interpretable Reinforcement Learning Manage Prosperity Your Way?
(Journal article; Peer reviewed, 2022)Personalisation of products and services is fast becoming the driver of success in banking and commerce. Machine learning holds the promise of gaining a deeper understanding of and tailoring to customers’ needs and ... -
Capacity driven small cell deployment in heterogeneous cellular networks : Outage probability and rate coverage analysis
(Journal article; Peer reviewed, 2020) -
A Case Study of Technology Use and Information Flow at a Danish E-clinic
(Chapter; Peer reviewed, 2020)There is an urgent call from health organizations, health professionals and health authorities to re-design care delivery for patients with chronic conditions and multimorbidities. The research project 3P- Patients and ... -
Categorizing networked services The role of intrinsic-, user network- and complement network attributes
(Journal article, 2009)Originality/value - The paper contributes with a conceptual framework for understanding and categorizing both extrinsic and intrinsic drivers of service value. It extends and integrates previous work on network effects and ... -
Causality-based Social Media Analysis for Normal Users Credibility Assessment in a Political Crisis
(Chapter; Peer reviewed, 2019) -
Centralized vs. Decentralized Investigating the advantages and disadvantages of single vendor vs. multivendor
(Master thesis, 2023)The purpose of this research was to see the differences between centralized and decentralized in various fields, such as IoT, and cloud computing systems, to decide if additional security is needed. The study showed that ... -
Centralized vs. Decentralized Investigating the advantages and disadvantages of single vendor vs. multivendor
(Master thesis, 2023)The purpose of this research was to see the differences between centralized and decentralized in various fields, such as IoT, and cloud computing systems, to decide if additional security is needed. The study showed that ... -
Channel Gain Cartography via Mixture of Experts
(Journal article; Peer reviewed, 2020) -
CISO: The Diplomat between Cybersecurity and Top Management
(Master thesis, 2022)Digitalization has transformed nearly all businesses in the last decades and more businesses rely on digital solutions to survive. With this change cybersecurity has become even more important and it is now important that ... -
CISO: The Diplomat between Cybersecurity and Top Management
(Master thesis, 2022)Digitalization has transformed nearly all businesses in the last decades and more businesses rely on digital solutions to survive. With this change cybersecurity has become even more important and it is now important that ...