Blar i Department of Information and Communication Technology på tittel
Viser treff 976-995 av 1275
-
The Riemann sum method for the design of sum-of-cisoids simulators for Rayleigh fading channels in non-isotropic scattering environments
(Journal article; Peer reviewed, 2009)In this paper, we introduce the Riemann sum method (RSM) as an effective tool for the design of sum-of-cisoids (SOC) simulators for narrowband mobile Rayleigh fading channels under non-isotropic scattering conditions. We ... -
Risk accelerators in disasters : insights from the typhoon Haiyan response on humanitarian information management and decision support
(Lecture Notes in Computer Science;8484, Chapter; Peer reviewed, 2014)Modern societies are increasingly threatened by disasters that require rapid response through ad-hoc collaboration among a variety of actors and organizations. The complexity within and across today's societal, economic ... -
Road Detection as a part of the Reward System for Reinforcement Learning-based Autonomous Cars
(Master thesis, 2019)Human drivers are subject to numerous flaws. It is common that the driversget tired and lose control of the vehicle, and some even get drunk or high, whichresults in dangerous situations for themselves and others.Autonomous ... -
Roaming mellom WLAN og UMTS : 3G håndholdt enhet som helsekommunikator
(Master thesis, 2006)Oppdragsgiver i denne oppgaven er CARDIAC AS. CARDIAC leverer i dag en løsning til St. Olavs Hospital i Trondheim som tar seg av all internkommunikasjon på sykehuset. Dette innbefatter bl.a. telefoni, pasientsignalvarsling, ... -
Robust Active Learning Multiple Fault Diagnosis of PMSM Drives with Sensorless Control under Dynamic Operations and Imbalanced Datasets
(Peer reviewed; Journal article, 2022)This paper proposes an active learning scheme to detect multiple faults in permanent magnet synchronous motors in dynamic operations without using historical labelled faulty training data. The proposed method combines the ... -
Robust Interpretable Text Classification against Spurious Correlations Using AND-rules with Negation
(IJCAI International Joint Conference on Artificial Intelligence, Peer reviewed; Conference object, 2022)The state-of-the-art natural language processing models have raised the bar for excellent performance on a variety of tasks in recent years. However, concerns are rising over their primitive sensitivity to distribution ... -
Robust Transmit Beamforming for Underlay D2D Communications on Multiple Channels
(Chapter; Peer reviewed, 2020) -
The role of digital technologies in global climate negotiations
(Peer reviewed; Journal article, 2023) -
The role of information systems in global governance: The case of climate reporting
(Doctoral dissertations at University of Agder; 460, Doctoral thesis, 2024)We live in a globally interconnected and interdependent world, where societal challenges are increasingly global in character. States and local communities cannot effectively address such challenges by themselves, which ... -
Role-based access control for wireless information systems
(Master thesis, 2004)Role Based Access Control (RBAC) is an effective access control method for protecting information and resources in large information systems. It is used as a basis for security in medium and ... -
ROSI calculation tool proposal for the Norwegian healthcare sector
(Master thesis, 2023)This master thesis focuses on addressing the need of Sykehuspartner HF, a state-owned business providing ICT services to healthcare providers in Norway, for an accurate tool to calculate Return on Security Investment (ROSI). ... -
ROSI calculation tool proposal for the Norwegian healthcare sector
(Master thesis, 2023)This master thesis focuses on addressing the need of Sykehuspartner HF, a state-owned business providing ICT services to healthcare providers in Norway, for an accurate tool to calculate Return on Security Investment (ROSI). ... -
Sammenkobling av lyd og visuelle effekter ved hjelp av datateknologi
(Master thesis, 2006)Sammenkobling av lyd og visuelle effekter kan man i dag se på diverse multimedieapplikasjoner. De applikasjonene som brukes i dag, bruker som regel metoder og algoritmer der man ser på frekvensene til et musikkstykke. ... -
Sammenligningsstudie av læringsplattformer
(Master thesis, 2022)Denne oppgaven omhandler sammenligning av digitale læringsplattformer. Grunnlaget for oppgaven var å utvikle to nettbaserte kurs for Utviklingssenter for sykehjem hjemmetjenester Agder. For å utvikle kursene ble det brukt ... -
SCADA Intrusion Detection System Test Framework
(Master thesis, 2017)Supervisory control and data acquisition (SCADA) systems play an important role in our critical infrastructure (CI). Several of the protocols used in SCADA communication are old and lack of security mechanisms. This ... -
Scalable and Privacy-Aware Online Learning of Nonlinear Structural Equation Models
(Peer reviewed; Journal article, 2023)An online topology estimation algorithm for nonlinear structural equation models (SEM) is proposed in this paper, addressing the nonlinearity and the non-stationarity of real-world systems. The nonlinearity is modeled using ... -
Scenario-based Serious Game to Teach about Healthcare
(Chapter; Peer reviewed, 2019)In this paper, we explore the concept of a scenario-based serious game for healthcare solutions. The complexity of the interactions and the multitude of actors is captured in a scenario, which is then played with the help ... -
Scenarios for Crisis in European Critical Energy Infrastructure
(Master thesis, 2009)A sudden crisis occurrence, such as a big electricity cut, might not be regarded as an isolated incident: In almost all cases, a power outage crisis might bring about multiple losses with e.g. legal, social and economic ... -
Seamless Hand-over Algorithm for Wireless Enterprise Networks
(Master thesis, 2007)The mass deployment of the Institute of Electrical and Electronics Engineers’ (IEEE) 802.11 based wireless local area networks (WLAN) and increased sales in hand-held devices supporting WLAN have resulted in an urgent ... -
Searchable Privacy-Enabled Information and Event Management Solution.
(Master thesis, 2015)With network traffic proliferating over the last couple of decades, there is an increasing need to monitor security information in order to prevent and resolve network security threats. A Security Information and Event ...