Blar i Department of Information and Communication Technology på tittel
Viser treff 978-997 av 1272
-
Robust Active Learning Multiple Fault Diagnosis of PMSM Drives with Sensorless Control under Dynamic Operations and Imbalanced Datasets
(Peer reviewed; Journal article, 2022)This paper proposes an active learning scheme to detect multiple faults in permanent magnet synchronous motors in dynamic operations without using historical labelled faulty training data. The proposed method combines the ... -
Robust Interpretable Text Classification against Spurious Correlations Using AND-rules with Negation
(IJCAI International Joint Conference on Artificial Intelligence, Peer reviewed; Conference object, 2022)The state-of-the-art natural language processing models have raised the bar for excellent performance on a variety of tasks in recent years. However, concerns are rising over their primitive sensitivity to distribution ... -
Robust Transmit Beamforming for Underlay D2D Communications on Multiple Channels
(Chapter; Peer reviewed, 2020) -
The role of digital technologies in global climate negotiations
(Peer reviewed; Journal article, 2023) -
The role of information systems in global governance: The case of climate reporting
(Doctoral dissertations at University of Agder; 460, Doctoral thesis, 2024)We live in a globally interconnected and interdependent world, where societal challenges are increasingly global in character. States and local communities cannot effectively address such challenges by themselves, which ... -
Role-based access control for wireless information systems
(Master thesis, 2004)Role Based Access Control (RBAC) is an effective access control method for protecting information and resources in large information systems. It is used as a basis for security in medium and ... -
ROSI calculation tool proposal for the Norwegian healthcare sector
(Master thesis, 2023)This master thesis focuses on addressing the need of Sykehuspartner HF, a state-owned business providing ICT services to healthcare providers in Norway, for an accurate tool to calculate Return on Security Investment (ROSI). ... -
ROSI calculation tool proposal for the Norwegian healthcare sector
(Master thesis, 2023)This master thesis focuses on addressing the need of Sykehuspartner HF, a state-owned business providing ICT services to healthcare providers in Norway, for an accurate tool to calculate Return on Security Investment (ROSI). ... -
Sammenkobling av lyd og visuelle effekter ved hjelp av datateknologi
(Master thesis, 2006)Sammenkobling av lyd og visuelle effekter kan man i dag se på diverse multimedieapplikasjoner. De applikasjonene som brukes i dag, bruker som regel metoder og algoritmer der man ser på frekvensene til et musikkstykke. ... -
Sammenligningsstudie av læringsplattformer
(Master thesis, 2022)Denne oppgaven omhandler sammenligning av digitale læringsplattformer. Grunnlaget for oppgaven var å utvikle to nettbaserte kurs for Utviklingssenter for sykehjem hjemmetjenester Agder. For å utvikle kursene ble det brukt ... -
SCADA Intrusion Detection System Test Framework
(Master thesis, 2017)Supervisory control and data acquisition (SCADA) systems play an important role in our critical infrastructure (CI). Several of the protocols used in SCADA communication are old and lack of security mechanisms. This ... -
Scalable and Privacy-Aware Online Learning of Nonlinear Structural Equation Models
(Peer reviewed; Journal article, 2023)An online topology estimation algorithm for nonlinear structural equation models (SEM) is proposed in this paper, addressing the nonlinearity and the non-stationarity of real-world systems. The nonlinearity is modeled using ... -
Scenario-based Serious Game to Teach about Healthcare
(Chapter; Peer reviewed, 2019)In this paper, we explore the concept of a scenario-based serious game for healthcare solutions. The complexity of the interactions and the multitude of actors is captured in a scenario, which is then played with the help ... -
Scenarios for Crisis in European Critical Energy Infrastructure
(Master thesis, 2009)A sudden crisis occurrence, such as a big electricity cut, might not be regarded as an isolated incident: In almost all cases, a power outage crisis might bring about multiple losses with e.g. legal, social and economic ... -
Seamless Hand-over Algorithm for Wireless Enterprise Networks
(Master thesis, 2007)The mass deployment of the Institute of Electrical and Electronics Engineers’ (IEEE) 802.11 based wireless local area networks (WLAN) and increased sales in hand-held devices supporting WLAN have resulted in an urgent ... -
Searchable Privacy-Enabled Information and Event Management Solution.
(Master thesis, 2015)With network traffic proliferating over the last couple of decades, there is an increasing need to monitor security information in order to prevent and resolve network security threats. A Security Information and Event ... -
Secure and Efficient Data Storage in Unattended Wireless Sensor Networks
(Journal article; Peer reviewed, 2009)Providing forward and backward secrecy is still a big challenge in Unattended Wireless Sensor Networks (UWSNs), though some storage schemes have been proposed. Additionally, high storage requirement needs efficient storage ... -
Secure and scalable dataprocessing and communications for an Animal Tracking System
(Master thesis, 2003)Modern technology is constantly being employed in new fields, by new industries and people. The cost of advanced technological equipment decreases continously, and equipment that was reserved for people and corporations ... -
Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications
(Peer reviewed; Journal article, 2023)One of the most significant recent advances in technology is the advent of unmanned aerial vehicles (UAVs), i.e., drones. They have widened the scope of possible applications and provided a platform for a wide range of ... -
Secure Group Communication Using Fractional Public Keys
(Chapter; Peer reviewed, 2010)In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement scheme that is based on fractional public keys. Shared group keys are computed ...