Blar i Department of Information and Communication Technology på tittel
Viser treff 292-311 av 1275
-
The Design of Sum-of-Cisoids Rayleigh Fading Channel Simulators Assuming Non-Isotropic Scattering Conditions
(Journal article; Peer reviewed, 2010)n this letter, we introduce the Riemann sum method (RSM) as an effective tool for the design of sum-of-cisoids (SOC) simulators for narrowband mobile Rayleigh fading channels under non-isotropic scattering conditions. We ... -
Design of wideband MIMO car-to-car channel models based on the geometrical street scattering model
(Journal article; Peer reviewed, 2012)We propose a wideband multiple-input multiple-output (MIMO) car-to-car (C2C) channel model based on the geometrical street scattering model. Starting from the geometrical model, a MIMO reference channel model is derived ... -
Design Requirements for a Patient Administered Personal Electronic Health Record
(Chapter; Peer reviewed, 2011) -
Design, implementation and analysis of a theft-resistant password manager based on Kamouflage architecture
(Master thesis, 2015)As a solution for helping companies and users in the constant security dilemma of obtaining and using passwords in the securest ways possible, password managers have become custom around the globe. The design architecture ... -
Designing a collaboration application for Sense Intellifield/Technology with use of contextual design
(Master thesis, 2004)Sense Technology and its branch company Sense Intellifield delivers integrated automation and information systems for the oil industry, marine and other industries. Now they are working on a project called IMEX, which ... -
Designing a framework for data populating alarms based on mitre techniques
(Master thesis, 2023)In this paper we aim to develop a proof of concept framework as a step-by-step process for identifying what type of information and log types a SOC analyst needs to analyze and handle an alarm based on the alarms MITRE ... -
Designing a framework for data populating alarms based on MITRE techniques
(Master thesis, 2023)In this paper we aim to develop a proof of concept framework as a step-by-step process for identifying what type of information and log types a SOC analyst needs to analyze and handle an alarm based on the alarms MITRE ... -
Designing for networked community resilience
(Journal article, 2016)Communities have been described to be at the heart of the preparedness for and the response to disasters. The increasing connectedness has made communities more vulnerable for their dependence on a complex network of ... -
Designing the Extended Zero Trust Maturity Model A Holistic Approach to Assessing and Improving an Organization’s Maturity Within the Technology, Processes and People Domains of Information Security
(Master thesis, 2022)Zero Trust is an approach to security where implicit trust is removed, forcing applications, workloads, servers and users to verify themselves every time a request is made. Furthermore, Zero Trust means assuming anything ... -
Designing the Extended Zero Trust Maturity Model A Holistic Approach to Assessing and Improving an Organization’s Maturity Within the Technology, Processes and People Domains of Information Security
(Master thesis, 2022)Zero Trust is an approach to security where implicit trust is removed, forcing applications, workloads, servers and users to verify themselves every time a request is made. Furthermore, Zero Trust means assuming anything ... -
DET: Data Enhancement Technique for Aerial Images
(Master thesis, 2022)Deep learning and computer vision are two thriving research areas within machine learning. In recent years, as the available computing power has grown, it has led to the possibility of combining the approaches, achieving ... -
DET: Data Enhancement Technique for Aerial Images
(Master thesis, 2022)Deep learning and computer vision are two thriving research areas within machine learning. In recent years, as the available computing power has grown, it has led to the possibility of combining the approaches, achieving ... -
Detecting and Classifying Hawaiian Monk Seal Vocalizations using Deep Learning
(Master thesis, 2022)The Hawaiian monk seal (Neomonachus schauinslandi) is one of the most endangered ma- rine mammals in the world. With an estimated population of 1,570 individuals remaining in the wild, the species have an urgent conservation ... -
Detecting and Classifying Hawaiian Monk Seal Vocalizations using Deep Learning
(Master thesis, 2022)he Hawaiian monk seal (Neomonachus schauinslandi) is one of the most endangered marine mammals in the world. With an estimated population of 1,570 individuals remaining in the wild, the species have an urgent conservation ... -
Detecting and Classifying Hawaiian Monk Seal Vocalizations using Deep Learning
(Master thesis, 2022)The Hawaiian monk seal (Neomonachus schauinslandi) is one of the most endangered marine mammals in the world. With an estimated population of 1,570 individuals remaining in the wild, the species have an urgent conservation ... -
Detecting malicious network activity using flow data and learning automata
(Master thesis, 2009)Malicious software has become an increasing problem for both businesses and home users. The traditional antivirus solutions are not always enough to detect an infection. As a result of this a lot of businesses are deploying ... -
Detecting Packed PE Files : Executable file analysis for the Windows operating system
(Master thesis, 2021)Malware authors invent new methods regularly to hide and obfuscate their code. One of these methods is known as packing. An entire program is hidden inside another executable program; however, the hidden program is usually ... -
Detection of Depression Using Weighted Spectral Graph Clustering With EEG Biomarkers
(Peer reviewed; Journal article, 2023)The alarming annual growth in the number of people affected by Major Depressive Disorder (MDD) is a problem on a global scale. In the primary scrutiny of depression, Electroencephalography (EEG) is one of the analytical ... -
Determinants of Blockchain Technology Introduction in Organizations: an Empirical Study among Experienced Practitioners
(Peer reviewed; Journal article, 2021)Blockchain is expected to enable new types of interorganizational relationships, new approaches to governance and new approaches to settlement and clearing processes. Neverthless, although the interest on blockchain is on ... -
Determining gastrointestinal tract dysbiosis using machine learning techniques
(Master thesis, 2015)This thesis explores machine learning techniques for the purpose of determining gastrointestinal tract dysbiosis. Dysbiosis is an unbalance of bacteria flora. Stool sample analysis of relevant bacterias can be used in ...