Blar i Department of Information and Communication Technology på emneord "IKT 590"
Viser treff 1-14 av 14
-
Adaptive Backbone and Link Correlation based Data Transmission Schemes for Wireless Sensor Networks
(Master thesis, 2015)One of the main challenges faced by modern wireless sensor networks (WSN) is rapid energy depletion of individual sensor nodes. In many applications, sensor nodes are deployed in outdoor environments and it is difficult ... -
Clustered File Type Identification
(Master thesis, 2015)This thesis examines the possibility of expanding the current field of research for file type identification in Digital Forensics. A proposed solution is presented where unsupervised clustering and supervised classification ... -
Design, implementation and analysis of a theft-resistant password manager based on Kamouflage architecture
(Master thesis, 2015)As a solution for helping companies and users in the constant security dilemma of obtaining and using passwords in the securest ways possible, password managers have become custom around the globe. The design architecture ... -
Determining gastrointestinal tract dysbiosis using machine learning techniques
(Master thesis, 2015)This thesis explores machine learning techniques for the purpose of determining gastrointestinal tract dysbiosis. Dysbiosis is an unbalance of bacteria flora. Stool sample analysis of relevant bacterias can be used in ... -
Distributed Resource Allocation for Device-to-Device Communication in LTE/LTE-A Networks
(Master thesis, 2015)Currently, 3GPP is working on device-to-device (D2D) communica- tions, which is regarded as a part of 5G mobile communication systems. This thesis focuses on allocation of radio resources, based on a scenario where ... -
Domestic Electricity Demand and Peak Predictions Considering Influence of Weather Parameters
(Master thesis, 2015)(Konfidensiell til/confidential until 01.07.2020) -
Feasibility analysis for forecasting inflow of unplanned work using machine learning techniques
(Master thesis, 2021) -
LTE- in Unlicensed Band: Medium Access and Performance Evaluation
(Master thesis, 2015)Long Term Evolution (LTE) technology is challenged by high data rate demanding services and increasing number of mobile phones which are equipped with Wi-Fi access capability. To respond to this challenge, 3rd Generation ... -
Neighbor and Service Discovery Protocols with Security Enhancement for Device-to-Device Communication in LTE{LTE-A Cellular Networks
(Master thesis, 2015)Device-to-Device (D2D) communication has become one of the most popular topic in the 5th generation (5G) mobile communication technology. D2D offers opportunities for access to services through direct neighbor device ... -
On-the-Fly Establishment of Multi-hop D2D Communication based on Android Smartphones and Embedded Platforms: Implementation and Real-Life Experiments
(Master thesis, 2015)(Konfidensiell til/confidential until 01.07.2020) -
Ontology based study planning and classification of university subjects
(Master thesis, 2015)This is first and foremost a research project into study planning at the University of Agder. What tools are available for students now, and can an ontology help make it easier? Having a plan for your education is important, ... -
Searchable Privacy-Enabled Information and Event Management Solution.
(Master thesis, 2015)With network traffic proliferating over the last couple of decades, there is an increasing need to monitor security information in order to prevent and resolve network security threats. A Security Information and Event ... -
Towards Automated Human Identification Using Dental X-ray Images
(Master thesis, 2015)Systems for automated human identification from dental X-ray images can be used to greatly reduce the necessary effort spent today by dental forensics experts. In this work a new methodology is proposed to create a system ... -
Towards Detecting Textual Plagiarism Using Machine Learning Methods
(Master thesis, 2015)Textual plagiarism is passing off someone else’s text as your own. The current state of the art in plagiarism detection performs well, but often uses a series of manually determined thresholds of metrics in order to ...