Blar i Department of Information and Communication Technology på tittel
Viser treff 753-772 av 1270
-
Naive Bayes classier-based fire detection using smartphone sensors
(Master thesis, 2014)For many years, smoke detectors have been used as the most crucial _re detection sensors.Although smoke detectors do their job very well, they are not perfect and may causefalse or late alarms. This is because they only ... -
Nasjonal plattform for deling og utvikling av læremateriell
(Master thesis, 2006)Denne studien ser nærmere på nytten av en nasjonal plattform for deling og utvikling av læremateriell, og hvordan man slik kan dele læremateriell på en måte som gjør at flest mulig lærere får størst mulig utbytte av det. ... -
Navigating the Phishing Landscape: A Novel Stage Model Unveiling the Journey of Individuals Exposed to Phishing Attempts
(Master thesis, 2023)The focus of this master thesis is to understand the process and stages individuals go through when exposed to a phishing attack. To achieve this objective, we will closely examine the responses of individuals throughout ... -
Navigating the Phishing Landscape: A Novel Stage Model Unveiling the Journey of Individuals Exposed to Phishing Attempts
(Master thesis, 2023)The focus of this master thesis is to understand the process and stages individuals go through when exposed to a phishing attack. To achieve this objective, we will closely examine the responses of individuals throughout ... -
Neighbor and Service Discovery Protocols with Security Enhancement for Device-to-Device Communication in LTE{LTE-A Cellular Networks
(Master thesis, 2015)Device-to-Device (D2D) communication has become one of the most popular topic in the 5th generation (5G) mobile communication technology. D2D offers opportunities for access to services through direct neighbor device ... -
Neighbor discovery and resource allocation for device-to-device communication
(Master thesis, 2014)Device-to-Device (D2D) communication has attracted lots of attention as one of the most advanced wirelesscommunication technologies which allows access to services offered by nearby devices bypassing the BaseStation (BS). ... -
Nettverksprotokoll for et kortholdsradiokommunikasjonssystem basert på CC1010
(Master thesis, 2003)Chipcon AS har utviklet et CC1010 integrert kretskort. I den forbindelsen har Chipcon AS et ønske om å designe en nettverksprotokoll som vil basere seg på CC1010. En typisk applikasjon hvor en slik protokoll skal kunne ... -
Network slice allocation for 5G V2X networks: A case study from framework to implementation and performance assessment
(Peer reviewed; Journal article, 2023)Empowered by the capabilities provided by fifth generation (5G) mobile communication systems, vehicle-to-everything (V2X) communication is heading from concept to reality. Given the nature of high-mobility and high-density ... -
Network Slicing Enabled Resource Management for Service-Oriented Ultra-Reliable and Low-Latency Vehicular Networks
(Peer reviewed; Journal article, 2020) -
Network Threat Detection Using Machine/Deep Learning in SDN-Based Platforms: A Comprehensive Analysis of State-of-the-Art Solutions, Discussion, Challenges, and Future Research Direction
(Peer reviewed; Journal article, 2022)A revolution in network technology has been ushered in by software defined networking (SDN), which makes it possible to control the network from a central location and provides an overview of the network’s security. Despite ... -
Networking logistic neurons can yield chaotic and pattern recognition properties
(Chapter; Peer reviewed, 2011)Over the last few years, the field of Chaotic Neural Networks (CNNs) has been extensively studied because of their potential applications in the understanding/recognition of patterns and images, their associative memory ... -
NeuralHash for Privacy Preserving Image Analysis
(Master thesis, 2022)This thesis aims to investigate how Apple's NeuralHash algorithm can be used in the context of facial recognition to improve privacy in facial recognition systems. Existing facial recognition solutions rely on having facial ... -
Neuroevolution of Actively Controlled Virtual Characters
(Master thesis, 2017)Physics-based character animation offer an attractive alternative to traditional animation techniques, however, physics-based approaches often struggle to incorporate active user control of these characters. This thesis ... -
Neuroevolution of Actively Controlled Virtual Characters - An Experiment for an Eight-Legged Character
(Chapter; Peer reviewed, 2018) -
A New Correlation Coefficient for T-Spherical Fuzzy Sets and Its Application in Multicriteria Decision-Making and Pattern Recognition
(Peer reviewed; Journal article, 2022)The goal of this paper is to design a new correlation coefficient for -spherical fuzzy sets (TSFSs), which can accurately measure the nature of correlation (i.e., positive and negative) as well as the degree of relationship ... -
A New Iterative Procedure for the Localization of a Moving Object/Person in Indoor Areas from Received RF Signals
(Chapter; Peer reviewed, 2019) -
New super-orthogonal space-time trellis codes using differential M-PSK for noncoherent mobile communication systems with two transmit antennas
(Journal article; Peer reviewed, 2011)In this paper, we develop super-orthogonal space-time trellis codes (SOSTTCs) using differential binary phase-shift keying, quadriphase-shift keying and eight-phase shift keying for noncoherent communication systems with ... -
A new tool for the modeling of AI and machine learning applications: Random walk-jump processes
(Lecture notes in computer science;6678, Chapter; Peer reviewed, 2011)There are numerous applications in Artificial Intelligence (AI) and Machine Learning (ML) where the criteria for decisions are based on testing procedures. The most common tools used in such random phenomena involve Random ... -
Noen aspekter ved implementasjon og ytelse for kryptosystemer basert på elliptiske kurver
(Master thesis, 2003)I den senere tid har kryptografi basert på elliptiske kurver blitt tatt i bruk i økende grad. De fleste av dagens implementasjoner baserer seg på kurver på Weierstrassform, y2z + a1xyz + a3yz2 = x3 + a2x2z + a4xz2 + a6z3. ...