Browsing Institutt for informasjonssikkerhet og kommunikasjonsteknologi by Title
Now showing items 783-802 of 2527
-
E2F-GAN: Eyes-to-Face Inpainting via Edge-Aware Coarse-to-Fine GANs
(Peer reviewed; Journal article, 2022)Face inpainting is a challenging task aiming to fill the damaged or masked regions in face images with plausibly synthesized contents. Based on the given information, the reconstructed regions should look realistic and ... -
Ear Recognition: Biometric Identification using 2- and 3-Dimensional Images of Human Ears
(Doktorgradsavhandlinger ved Høgskolen i Gjøvik;2/2015, Doctoral thesis, 2015-06-05)The outer ear is an emerging biometric trait that has drawn the attention of the research community for more than a decade. The unique structure of the auricle is long known among forensic scientists and has been used for ... -
Early cyber-grooming detection: Combining the Sliding window and Continuous risk-metric methods
(Master thesis, 2023)Cyber-grooming er et økende problem. Gjennom bruk av moderne teknologi kan en overgriper få tilgang til barn som tidligere var utenfor overgriperens geografiske begrensende område. Problemet er ikke bare et samfunnsproblem, ... -
Early Detection of Cybergrooming Conversations
(Master thesis, 2023)Problemet omkring cybergrooming has fått mer oppmerksomhet etter hvert som flere personer knytter seg sammen digitalt. For å løse dette problemet kan forebyggende mekanismer som oppdager cybergrooming- forsøk i nettsamtaler ... -
Early gender detection using keystroke dynamics and stylometry
(Master thesis, 2021)For mange mennesker har Internett blitt en viktig arena for å stifte nye bekjentskap. Dette innebærer ofte at man befinner seg i chatsamtaler der man ikke har noen garantier på at motparten er den som vedkommende utgir seg ... -
Early Soft Biometric Voice Recognition
(Master thesis, 2023)Voksne som utgir seg for å være barn kan utgjøre en trussel mot barn ved å oppgi feil alder på kommunikasjonsplattformer for å henvende seg til barn på nettet. For dette emnet er det utført studier der man undersøker den ... -
Easy 4G/LTE IMSI Catchers for Non-Programmers
(Journal article; Peer reviewed, 2017)IMSI Catchers are tracking devices that break the privacy of the subscribers of mobile access networks, with disruptive effects to both the communication services and the trust and credibility of mobile network operators. ... -
Eavesdropping an EFC transaction using SDR
(Master thesis, 2018)The use of Electronic Fee Collection (EFC) system is widespread in Europe, to charge drivers for the use of toll roads. It is based on a wireless high-frequency communication between a tag in the car (OBU) and a device ... -
Economic analysis of QoS differentiation in OPS networks
(Master thesis, 2012)Quality of Service (QoS) differentiation is the differentiated traffic-handling toachieve multiple service classes of varying quality. In addition to providing serviceguarantees necessary for delay-sensitive, real-time ... -
Economic Profitability in the Norwegian Fibre-to-the-Home Market
(Master thesis, 2010)In today s modern information society, the need for FTTH is emerging. Other technologies may still cope with most of the challenges, but only FTTH does it seamlessly. Also, for the current bandwidth needs, FTTH has a lot ... -
Economics in the networked computer game industry
(Master thesis, 2013)This thesis presents several of the business models utilized in the economics of the online networked computer games. The Free2Play and micro-transactions monetization business model, a sub-category of the Freemium business ... -
Economics in the Small and Independent Game Industry
(Master thesis, 2011)In order to look into the small and independent game industry this thesis presents an analysis of the business model of the game Minecraft using the ontology and framework defined in Osterwalders dissertation. The main ... -
EDAS: An evaluation prototype for autonomic event-driven adaptive security in the internet of things
(Journal article; Peer reviewed, 2015)In Internet of Things (IoT), the main driving technologies are considered to be tiny sensory objects. These objects cannot host traditional preventive and detective technologies to provide protection against the increasing ... -
Edge Capacity Planning for Real Time Compute-Intensive Applications
(Chapter, 2019)Cloud computing is a major breakthrough in enabling multi-user scalable web services, process offloading and infrastructure cost savings. However, public clouds impose high network latency which became a bottleneck for ... -
Editorial Image Retrieval using Handcrafted and CNN Features
(Journal article; Peer reviewed, 2018)Textual keywords have been used in the early stages for image retrieval systems. Due to the huge increase of image content, an image is efficiently used instead according to the time computation. Deciding powerful feature ... -
Education for Cognitive Agility: Improved Understanding and Governance of Cyberpower
(Journal article; Peer reviewed, 2018)Introducing novel techniques designed to scaffold learning and measure performance in military learners being trained to defend computer networks requires alternative education models. This paper presents how methods of ... -
Effect of Communication Failures on State Estimation of 5G-Enabled Smart Grid
(Peer reviewed; Journal article, 2020)Information and Communication Technologies (ICT), Wide Area Measurement Systems (WAMS) and state estimation represent the key-tools for achieving a reliable and accurate knowledge of the power grid, and represent the ... -
The Effect of Heart Rate Variability Biofeedback Training on Vagal Tone in Athletically Talented Secondary School Students
(Peer reviewed; Journal article, 2022)This study examines whether twelve sessions of heart rate variability biofeedback training would improve vagally mediated heart rate variability. If so, it would go some way in explaining why breathing based interventions ...