Blar i Department of Information and Communication Technology på tittel
Viser treff 912-931 av 1273
-
Possible use of RFID technology in support of construction logistics
(Master thesis, 2004)Radio Frequency Identification (RFID) is a relatively old technology that has gained enormous popularity in the later years, as more and more areas of business see it as a possible technology with which to improve their ... -
Post-Quantum Secure Identity-Based Encryption Scheme using Random Integer Lattices for IoT-enabled AI Applications
(Peer reviewed; Journal article, 2022)Identity-based encryption is an important cryptographic system that is employed to ensure confidentiality of a message in communication. This article presents a provably secure identity based encryption based on post quantum ... -
Potential AI Strategies to Solve the Commons Game : A Position Paper
(Lecture Notes in Computer Science; no. 6085, Journal article; Peer reviewed, 2010)In this paper, we propose the use of hill climbing and particle swarm optimization to find strategies in order to play the Commons Game (CG). The game, which is a non-trivial N-person non-zero-sum game, presents a simple ... -
Power allocation in multi-channel cognitive radio networks with channel assembling
(Chapter; Peer reviewed, 2011)Consider power allocation for Secondary User (SU) packet transmissions over multiple channels with variable Primary User (PU) arrival rates in cognitive radio networks. Two problems are studied in this paper: The first one ... -
Power consumption analysis for mobile stations in hybrid relay-assisted wireless networks
(Chapter; Peer reviewed, 2010)While Internet access using mobile or wireless technologies has become ubiquitous these days, the energy consumption aspect of such connections has not been studied in-depth yet. In this paper, a hybrid wireless network, ... -
Preamble Reservation Based Access for Grouped mMTC Devices with URLLC Requirements
(Journal article; Peer reviewed, 2019)Ultra-reliable low latency communication (URLLC) and massive machine type communications (mMTC) are two of the three major technological pillars in 5G. For medium access in mMTC scenarios, e.g., smart cities, a major ... -
Preamble Transmission Prediction for mMTC Bursty Traffic : A Machine Learning based Approach
(Journal article; Peer reviewed, 2020) -
Predicting Electrical Power Consumption on Yearly Events for Substations: Algorithm Design and Performance Evaluations
(Master thesis, 2020)Accurate prediction of electricity usage is critical for grid companies in or-der to ensure reliable power supply for their customers. Many factors in-fluence usage patterns, but generally they consist of yearly-, ... -
Prediction of Electricity Usage Using Convolutional Neural Networks
(Master thesis, 2017)Convolutional Neural Networks are overwhelmingly accurate when attempting to predict numbers using the famous MNIST-dataset. In this paper, we are attempting to transcend these results for time- series forecasting, and ... -
Preoperative anemia and iron deficiency screening, evaluation and management : Barrier identification and implementation strategy mapping
(Journal article; Peer reviewed, 2020) -
Priority Enabled Grant-Free Access With Dynamic Slot Allocation for Heterogeneous mMTC Traffic in 5G NR Networks
(Peer reviewed; Journal article, 2021)Although grant-based mechanisms have been a predominant approach for wireless access for years, the additional latency required for initial handshake message exchange and the extra control overhead for packet transmissions ... -
Priority-based initial access for URLLC traffic in massive IoT networks: Schemes and performance analysis
(Peer reviewed; Journal article, 2020)At a density of one million devices per square kilometer, the10’s of billions of devices, objects, and machines that form a massive Internet of things (mIoT) require ubiquitous connectivity. Among a massive number of IoT ... -
Privacy in Smart Homes Using Privacy Impact Assessment to Inspect Privacy Issues in a Smart Home
(Master thesis, 2022)IoT has an ever-increasing amount of development as more and more different devices connect to the Internet and become IoT devices. For the regular private user, the smart home may be the most enticing domain of IoT as it ... -
Privacy preserving pattern matching : implementation issues
(Master thesis, 2002)The growing of the Internet has the potential to erode personal privacies. One can monitor a private data through the Internet without data owner knowledge. The project is to implement technique that allow pattern ... -
Privacy protection in a mobile biomedical information collection service
(Master thesis, 2006)This report presents a model in a mobile health care environment and uses a combination of existing technologies to build a privacy protection scheme. This work covers security issues in both the wireless and wired network, ... -
Privacy Violation Classification of Snort Ruleset
(Journal article; Peer reviewed, 2010)It is important to analyse the privacy impact of Intrusion Detection System (IDS) rules, in order to understand and quantify the privacy-invasiveness of network monitoring services. The objective in this paper is to classify ... -
Privacy-preserving document similarity detection
(Master thesis, 2011)The document similarity detection is an important technique used in many applications. The existence of the tool that guarantees the privacy protection of the documents during the comparison will expand the area where ... -
Problem/issue detection and classification
(Master thesis, 2009)This thesis investigates the possibility of using pattern recognition and machine learning to detect online forum posts containing descriptions of problems and issues. In addition we seek to further classify these posts ... -
Process Improvement Solution for Mobile Platform Customer SW Development
(Master thesis, 2008)Time to market is becoming an increasingly important topic in software industry. In this trend, handling customer change requests is of a paramount importance. In the current thesis, we investigate reducing the lead time ... -
Prosessforbedring og teknologistøtte for semistrukturerte prosesser
(Master thesis, 2001)Rapporten omhandler utvikling av et adaptiv Workflow Management System (WfMS). Systemet skal brukes i forbedring av en faktureringsprosess for konsulenter. I den forbindelse behandles sentrale teorier innen prosessforbedring ...