Blar i Fakultet for informasjonsteknologi og elektroteknikk (IE) på tittel
Viser treff 20062-20081 av 21021
-
Using a Behavioral Match-to-Sample Method to Evaluate Color Vision Deficiency Simulation Methods
(Journal article; Peer reviewed, 2016)Color vision deficiency (CVD) simulation methods are used both to simulate color vision of color-deficient people and as input for image enhancement methods for the color-deficient. However, a standardized method to compare ... -
Using a machine learning approach for URL analysis
(Master thesis, 2023)Den raske veksten av Internett-baserte aktiviteter har ført til en betydelig økning i cybertrusler, med villedende og ondsinnede URL-er som fungerer som et nøkkelverktøy for å spre skadelig programvare, utføre phishing-angrep ... -
Using a Mobile, Agent-Based Environment to Support Cooperative Software Processes
(Dr. ingeniøravhandling, 0809-103X; 2001:11, Doctoral thesis, 2001)Cooperative Software Engineering (CSE) means that large-scale, software development and maintenance can be conducted in a distributed organisation or across organisations. CSE can be characterised by distributed process ... -
Using a processor for memory-efficient GUI display driving
(Master thesis, 2022)Mikrokontrollere blir stadig sterkere, og mer avanserte teknologier dukker stadig opp, spesielt innen utivklingen av innvevde systemer. Det virker logisk å bruke disse sterkere enhetene i mer komplekse innvevde systemer ... -
Using a Service Lens to Better Understand Practices –and Vice Versa
(Peer reviewed; Journal article, 2023)Many studies of practices involve service exchange, and many service researchers have discovered the central role that sociotechnical practices play in service –in particular, within the service-dominant logic school of ... -
Using a socio-technical systems approach to design and support systems thinking in cyber security education
(Journal article; Peer reviewed, 2018)Information security (IS) has been categorized as protecting the confidentiality, integrity, availability, authentication and accountability of information. There is a gap between what companies and institutions plan to ... -
Using acoustic telemetry to monitor the effects of crowding and delousing procedures on farmed Atlantic salmon (Salmo salar)
(Journal article; Peer reviewed, 2018)The aim of this study was to demonstrate the feasibility of acoustic telemetry for monitoring fish during farm operations and gather knowledge about Atlantic salmon responses during crowding and delousing events in a ... -
Using an acoustic camera to determine the sound power of moving sources
(Master thesis, 2019)Denne oppgaven tar for seg å bestemme lyden fra et passerende tog med et akustisk kamera. Dette inkluderer testing av det akustiske kameraet, feltmålinger og en simulering. Testingen av kameraets egenskaper innebar en ... -
Using an autonomous underwater vehicle with onboard stochastic advection-diffusion models to map excursion sets of environmental variables
(Peer reviewed; Journal article, 2021)New robotic sensor platforms have computing resources that enable a rich set of tasks for adaptive monitoring of the environment. But to substantially augment the toolbox of environmental sensing, such platforms must be ... -
Using an Extended Technology Acceptance Model to Predict Enterprise Architecture Adoption in Making Cities Smarter
(Peer reviewed; Journal article, 2022)Presently cities are undergoing changes and transformations due to the adoption of information and communications technology. Enterprise Architecture (EA) is one of the approaches adopted by practitioners and researchers ... -
Using an Inertial Measurement Unit and Motion Capture to Develop next Generation Analytic Biathlon Shooting Measuring System
(Master thesis, 2019)I dag eksisterer det flere analytiske målesystemer i skiskyting, fungerende som en sammenkobling mellom skiskytterens skyte egenskaper og skyte resultater. Slike systemer har bidratt med å forbedre resultatene på standplass ... -
Using aromas to search for preserved measures and integrals in Kahan’s method
(Peer reviewed; Journal article, 2023)The numerical method of Kahan applied to quadratic differential equations is known to often generate integrable maps in low dimensions and can in more general situations exhibit preserved measures and integrals. Computerized ... -
Using Artificial Neural Networks To Forecast Financial Time Series
(Master thesis, 2010)This thesis investigates the application of artificial neural networks (ANNs) for forecasting financial time series (e.g. stock prices).The theory of technical analysis dictates that there are repeating patterns that occur ... -
Using Artificial Neural Networks to Model Running Speed in Orienteering
(Master thesis, 2012)This thesis concerns the modeling of running speed in orient-eering by means of multi-layered feed forward artificial neu-ral networks with Backpropagation learning, using GPS tracks of orienteers, an orienteering map and ... -
Using Author Profiling to Determine the Age Group of an Author
(Master thesis, 2019)Denne masteroppgaven utforsker hvordan fastslå aldersgruppen til en forfatter. I hovedsak om forfatteren er et barn, som vil si under 18 år, eller voksen, 25 år og oppover. Videre er målet å undersøke hvilke tekstlige trekk ... -
Using Automated Feature Selection for Building Case-Based Reasoning Systems: An Example from Patient-Reported Outcome Measurements
(Chapter, 2021)Feature selection for case representation is an essential phase of Case-Based Reasoning (CBR) system development. To (semi-)automate the feature selection process can ease the knowledge engineering process. This paper ... -
Using benchmarking to improve IDS configurations
(Master thesis, 2004)NORSK: Benchmarking av Intrusion Detection Systems (IDS) kan være en viktig metode for å finne ut om IDSen fungerer som den skal. Da IDS fungerer som en vaktbikkje mot angrep, skadelig programvare eller andre potensielle ... -
Using Bi-directional Data Diodes to Limit Propagation of Network Attacks
(Master thesis, 2019)De fleste nettverk er sårbare for angrep på flere forskjellige enheter. Etter at en angriper har klart å få tilgang til en enhet på nettverket kan han bruke den til å angripe andre enheter koblet til det samme nettverket. ... -
Using Blockchains to strengthen the security of Internet of Things
(Chapter, 2018)Blockchain is a distributed ledger technology that became popular as the foundational block of the Bitcoin cryptocurrency. Over the past few years it has seen a rapid growth, both in terms of research and commercial usage. ... -
Using Bluetooth Low Energy in Sensor Devices: Possible Applications in Welfare Technology
(Master thesis, 2011)In anticipation of the support for Bluetooth Low Energy in consumer products, this report provide an introduction to the technology, experiments on power consumption and the design of a custom implementation.With the new ...