• A Netnographic Study on the Dark Net Ecosystem for Ransomware 

      Bayoumy, Yara; Meland, Per Håkon; Sindre, Guttorm (Chapter, 2018)
      For more than a decade, businesses and private citizens alike have been tormented by an online phenomenon that has changed our stance on cyber security. Ransomware, malicious software that demands payment in exchange for ...
    • A new malware detection system using a high performance-ELM method 

      Shamshirband, Shahab; Chronopoulos, Anthony T. (Chapter, 2019)
      A vital element of a cyberspace infrastructure is cybersecurity. Many protocols proposed for security issues, which leads to anomalies that affect the related infrastructure of cyberspace. Machine learning (ML) methods ...
    • A novel arrangement for improving three phase saturated-core fault current limiter (SCFCL) 

      Arab Baferani, Mohammadreza; Rostaghi Chalaki, Mojtaba; Fahimi, Navid; Shayegani Akmal, Amir Abbas; Niayesh, Kaveh (Chapter, 2018)
      Fault current limiter (FCL) is a device that has low impedance in normal state of the power network and has simultaneous large impedance in the time of fault, so that it would lead to limitation of the fault current. Among ...
    • A novel Doppler based speed measurement technique for individual free-ranging fish 

      Hassan, Waseem; Føre, Martin; Pedersen, Magnus Oshaug; Alfredsen, Jo Arve (Chapter, 2019)
      A novel Doppler based speed measurement technique for free-ranging acoustically tagged fish was developed and validated through a field experiment in a marine aquaculture farm. For emulated swimming speeds in the range ...
    • A Novel Low Cost ROV for Aquaculture Application 

      Osen, Ottar; Sandvik, Rolf-Inge; Berge Trygstad, Jørgen; Rogne, Vegard; Zhang, Houxiang (Chapter, 2017)
      Marine aquaculture is deeply rooted in Norwegian national economics and traditions, especially in the MØre og Romsdal region. This paper presents the development of a novel ROV for aquaculture inspection in marine application ...
    • A Novel Methodology to Monitor Partial Discharges in Microvoids at Solid-Solid Interfaces 

      Kantar, Emre; Ildstad, Erling (Chapter; Peer reviewed, 2019)
      The combination of two solid dielectrics increases the risk of partial discharge (PD) activity in microscopic cavities at the solid-solid dielectric interfaces, facilitating interface tracking failures. The main purpose ...
    • A Phenomenological Model of Percussive Drilling: Review of Experimental Evidence 

      Song, Xianfeng; Aamo, Ole Morten; Kane, Pascal-Alexandre; Detournay, Emmanuel (Chapter, 2019)
      In this paper, we review and analyze published experimental findings in light of the hypothesis that the dependence of bit-rock interface (BRI) pseudo-stiffness on the weight-on-bit (WOB) is the key factor behind the ...
    • A Platform Agnostic Dual-Strand Hate Speech Detector 

      Meyer, Johannes Skjeggestad; Gambäck, Björn (Chapter, 2019)
      Hate speech detectors must be applicable across a multitude of services and platforms, and there is hence a need for detection approaches that do not depend on any information specific to a given platform. For instance, ...
    • A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability 

      Gjøsteen, Kristian; Strand, Martin (Chapter, 2017)
      After the trials of remote internet voting for local elections in 2011 and parliamentary elections in 2013, a number of local referendums has renewed interest in internet voting in Norway. The voting scheme used in ...
    • A Robust Predictive MPPT Strategy: An Enabler for Improving the Photovoltaic Conversion Source 

      Nademi, Hamed; Soghomonian, Zareh; Norum, Lars Einar (Chapter, 2017)
      The key drivers for Maximum Power Point Tracking (MPPT) solutions in photovoltaic (PV) power plants are independency from solar panels, fast tracking of irradiance and temperature variations, and efficiency of conversion ...
    • A scalable resource allocation scheme for NFV: Balancing utilization and path stretch 

      Woldeyohannes, Yordanos Tibebu; Mohammadkhan, Ali; Ramakrishnan, K. K.; Jiang, Yuming (Chapter, 2018)
      Network Function Virtualization (NFV) implements network middlebox functions in software, enabling them to be more flexible and dynamic. NFV resource allocation methods can exploit the capabilities of virtual- ization to ...
    • A Security Policy Infrastructure for Tactical Service Oriented Architectures 

      Gkioulos, Vasileios; Wolthusen, Stephen (Chapter, 2017)
      Tactical networks are affected by multiple constraints related to the limited node characteristics and the availability of resources. These constraints within the highly dynamic tactical environment, impose significant ...
    • A Ship Heading and Speed Control Concept Inherently Satisfying Actuator Constraints 

      Sørensen, Mikkel Eske Nørgaard; Breivik, Morten; Eriksen, Bjørn-Olav Holtung (Chapter; Peer reviewed, 2017)
      Satisfying actuator constraints is often not considered in the academic literature on the design of ship heading and speed controllers. This paper considers the use of a simplified dynamic window algorithm as a way to ...
    • A simplified model of planar snake robot locomotion 

      Liljeback, Pål; Pettersen, Kristin Ytterstad; Stavdahl, Øyvind; Gravdahl, Jan Tommy (Chapter; Peer reviewed, 2010)
      This paper presents a model of the kinematics and dynamics of a planar, wheelless snake robot aimed at control design and stability analysis purposes. The proposed model is significantly less complex than existing models ...
    • A Simulation Analysis of CO2 Capture and Underground Storage Monitoring in Smeaheia 

      Anyosa, Susan; Bunting, Scott William Christopher; Eidsvik, Jo; Romdhane, Mohamed Anouar (Chapter, 2019)
      The emissions of CO2 are an environmental problem and one possible solution is its capture and conduct underground storage (CSS). However, there is potential risk of leakage, and to aid in this challenge we propose to use ...
    • A Simulation Study of Evaluation Heuristics for Tug Fleet Optimisation Algorithms 

      Bye, Robin Trulssen; Schaathun, Hans Georg (Chapter, 2015)
      Tug fleet optimisation algorithms can be designed to solve the problem of dynamically positioning a fleet of tugs in order to mitigate the risk of oil tanker drifting accidents. In this paper, we define the 1D tug fleet ...
    • A Smart City Ecosystem Enabling Open Innovation 

      Ahlers, Dirk; Wienhofen, Leendert Wilhelmus Marinus; Petersen, Sobah Abbas; Anvaari, Mohsen (Chapter, 2019)
      In this position paper we present IT-centered challenges that lie in designing an architecture for a flexible, open, transferable, and replicable smart city ecosystem spanning a plethora of suppliers and systems. The ...
    • A snake-like robot for internal inspection of complex pipe structures (PIKo) 

      Fjerdingen, Sigurd Aksnes; Liljeback, Pål; Transeth, Aksel Andreas (Chapter, 2009)
      This paper presents a mechanism for navigating complex pipe structures, both horizontally and vertically. The mechanism consists of a series of identical modules interconnected by two degree of freedom active joints. A set ...
    • A Software Architecture for Simulation and Visualisation based on the Functional Mock-up Interface and Web Technologies 

      Hatledal, Lars Ivar; Schaathun, Hans Georg; Zhang, Houxiang (Chapter, 2015)
      This paper presents a software architecture for a collaborative virtual environment (CVE) for simulation and visualisation based on the Functional Mock-up Interface (FMI) for co-simulation and web technologies. FMI has ...
    • A Software Framework For Intelligent Computer-Automated Product Design 

      Bye, Robin Trulssen; Osen, Ottar; Pedersen, Birger Skogeng; Hameed, Ibrahim; Schaathun, Hans Georg (Chapter, 2016)
      For many years, NTNU in Ålesund (formerly Aalesund University College) has maintained a close relationship with the maritime industrial cluster, centred in the surrounding geographical region, thus acting as a hub for both ...