Now showing items 2155-2174 of 2525

    • A study on tighter and more efficient isogeny-based cryptographic protocols 

      Veroni, Mattia (Doctoral theses at NTNU;2023:100, Doctoral thesis, 2023)
      This PhD thesis addresses the following research questions: • RQ 1: Can we prove tight reductions on isogeny-based schemes? • RQ 2: How sound are the assumptions underlying some computational problems in isogeny-based ...
    • Studying vulnerability history in an open-source software package 

      Bjørnseth, Geir Arne Mo (Master thesis, 2021)
      I løpet av de siste årene har vi sett et økt fokus på utvikling av sikker programvare med rammeverk og verktøy som Microsoft Security Development Life Cycle og OWASP Software Maturity Model, men fortsatt ser vi kjente og ...
    • Sub-Wavelength Aggregation and Fusion performance experiment 

      Birhanu, Zekarias Teshome (Master thesis, 2014)
      The communication network that has connected most part of world s population, and continues to bring more people to the communication grid is being overwhelmed by a vast amount of traffic coming from an increasing number ...
    • Subjective Evaluation of Media Consumer Vulnerability to Fake Audiovisual Content 

      Khodabakhsh, Ali; Ramachandra, Raghavendra; Busch, Christoph (Chapter, 2019)
      Facilitation of fake face generation in recent years, thanks to advancements in computer graphics and artificial intelligence, raises concerns about malicious use of these techniques for personal or political gains. Media ...
    • Subjective evaluations of example-based, total variation, and joint regularization for image processing 

      Anderson, Hyrum S.; Gupta, Maya R.; Hardeberg, Jon Yngve (Journal article; Peer reviewed, 2012)
      We report on subjective experiments comparing example-based regularization, total variation regularization, and the joint use of both regularizers. We focus on the noisy deblurring problem, which generalizes image supe ...
    • Subjective Versus Objective Face Image Quality Evaluation For Face Recognition 

      Khodabakhsh, Ali; Pedersen, Marius; Busch, Christoph (Chapter, 2019)
      The performance of any face recognition system gets affected by the quality of the probe and the reference images. Rejecting or recapturing images with low-quality can improve the overall performance of the biometric system. ...
    • Subsurface resistivity estimation by seismic-guided inversion of marine controlled-source electromagnetic data 

      Guo, Zhenwei (Doctoral theses at NTNU;2016:289, Doctoral thesis, 2016)
      Marine controlled-source electromagnetic (CSEM) has been in commercial use for offshore hydrocarbon exploration for fifteen years. It is significant for geologists and geophysicists to design and interpret a marine EM ...
    • Successfully Implementing GDPR in the Norwegian Online Advertising Industry 

      Gjelsvik, Nicholas; Saga, Vegard (Master thesis, 2019)
      I løpet av de siste månedene før EUs personvernforordning (GDPR) trådte i kraft den 25. mai 2018, blomstret diskusjonen om konsekvensene for nettbasert annonsering. Noen fryktet at GDPR ville påvirke brukeropplevelsen av ...
    • Suitability of Blockchains to Enable and Support Networking Functions: State of Art 

      Gebraselase, Befekadu Gezaheng; Helvik, Bjarne Emil; Jiang, Yuming (Chapter, 2019)
      The underlying network infrastructure faces challenges from addressing maintenance, security, performance, and scalability to make the network more reliable and stable. Software-defined networking, blockchain, and network ...
    • Support for nurses’ strategies to handle (un)wanted nurse calls: A design science approach 

      Klemets, Joakim (Doctoral theses at NTNU;2016:355, Doctoral thesis, 2016)
      A nurse call system allows patients in a hospital department to remotely call for a nurse’s assistance when required. Commonly, a nurse call system notifies nurses about an issued call through strategically placed alarm ...
    • A Survey of 802.15.4 TSCH Schedulers for a Standardized Industrial Internet of Things 

      Urke, Andreas Ramstad; Kure, Øivind; Øvsthus, Knut (Peer reviewed; Journal article, 2021)
      Concepts such as Industry 4.0 and Cyber-Physical Systems may bring forward a new industrial revolution. These concepts require extensive connectivity far beyond what is provided by traditional industrial networks. The ...
    • A survey of artificial intelligence techniques for user perceptions’ extraction from social media data 

      Shaikh, Sarang; Yildirim Yayilgan, Sule; Zoto, Erjon; Abomhara, Mohamed (Peer reviewed; Journal article, 2022)
      Measuring and analyzing user perceptions and behaviors in order to make user-centric decisions has been a topic of research for a long time even before the invention of social media platforms. In the past, the main approaches ...
    • Survey of Key Management in Ad Hoc Networks 

      Hegland, Anne Marie; Winjum, Eli; Mjølsnes, Stig Frode; Rong, Chunming; Kure, Øivind; Spilling, Pål (Journal article; Peer reviewed, 2006)
      The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes ...
    • Survey of Performance Acceleration Techniques for Network Function Virtualization 

      Linguaglossa, Leonardo; Lange, Stanislav; Pontarelli, Salvatore; Rétvári, Gábor; Rossi, Dario; Zinner, Thomas Erich; Bifulco, Roberto; Jarschel, Michael; Bianchi, Giuseppe (Journal article; Peer reviewed, 2019)
      The ongoing network softwarization trend holds the promise to revolutionize network infrastructures by making them more flexible, reconfigurable, portable, and more adaptive than ever. Still, the migration from ...
    • A Survey of Specification-based Intrusion Detection Techniques for Cyber-Physical Systems 

      Nweke, Livinus Obiora (Peer reviewed; Journal article, 2021)
      Cyber-physical systems (CPS) integrate computation and communication capabilities to monitor and control physical systems. Even though this integration improves the performance of the overall system and facilitates the ...
    • A survey on 802.11 MAC industrial standards, architecture, security & supporting emergency traffic: Future directions 

      Memon, Shuaib K.; Nisar, Kashif; Hijazi, Mohd Hanafi Ahmad; Chowdhry, B.S.; Sodhro, Ali Hassan; Pirbhulal, Sandeep; Rodrigues, Joel J.P.C. (Peer reviewed; Journal article, 2021)
      The IEEE 802.11-based Wireless Local Area Network (WLAN) has become a ubiquitous networking technology deployed around the world. IEEE 802.11 WLAN are now widely used for real-time multimedia applications (e.g. voice and ...
    • Survey on Communication and Networks for Autonomous Marine Systems 

      Zolich, Artur Piotr; Palma, David; Kansanen, Kimmo; Fjørtoft, Kay Endre; Sousa, João; Johansson, Karl H.; Jiang, Yuming; Dong, Hefeng; Johansen, Tor Arne (Journal article; Peer reviewed, 2018)
      The rapid development of autonomous systems and Information and Communications Technologies (ICT) create new opportunities for maritime activities. Existing autonomous systems are becoming more powerful and utilise the ...
    • Survey on Digital Twins: from concepts to applications 

      B. Heluany, Jessica; Gkioulos, Vasileios (Chapter, 2023)
      This study provides a systematic literature review on surveys across the topic of digital twins. The aim is to understand what have been the use cases, modelling and simulation tools/techniques, and how security is being ...
    • Survey on Digital Twins: from concepts to applications 

      B. Heluany, Jessica; Barbosa Heluany, Jessica (Peer reviewed; Journal article, 2023)
      This study provides a systematic literature review on surveys across the topic of digital twins. The aim is to understand what have been the use cases, modelling and simulation tools/techniques, and how security is being ...
    • Survey on features for fingerprint indexing 

      Schuch, Patrick (Journal article; Peer reviewed, 2018)
      Nowadays, several biometric databases already contain millions of entries of individuals. With an increasing number of enrolled individuals, the response time of queries grows and can become critical. Fingerprint indexing ...