Now showing items 502-521 of 627

    • A Self-Configuration and Healing Controller To Analyze Misconfigurations of Clusters and IoT Edge Devices 

      Elgazazz, Areeg Samir Ahmed; Dagenborg, Håvard Johansen (Conference object; Konferansebidrag, 2023)
    • A Self-Configuration Controller To Detect, Identify, and Recover Misconfiguration At IoT Edge Devices and Containerized Cluster System 

      Elgazazz, Areeg Samir Ahmed; Dagenborg, Håvard (Journal article; Tidsskriftartikkel; Peer reviewed, 2023)
      Securing workloads and information flow against misconfiguration in container-based clusters and edge medical devices is an important part of overall system security. This paper presented a controller that analyzes the misconfiguration, maps the observation to its hidden misconfiguration type, and selects the optimal recovery policy to maximize the performance of defined metrics. In the future, we ...
    • Semi-CNN architecture for effective spatio-temporal Learning in action recognition 

      Leong, Mei Chee; Prasad, Dilip K.; Lee, Yong Tsui; Lin, Feng (Journal article; Tidsskriftartikkel; Peer reviewed, 2020-01-12)
      This paper introduces a fusion convolutional architecture for efficient learning of spatio-temporal features in video action recognition. Unlike 2D convolutional neural networks (CNNs), 3D CNNs can be applied directly on consecutive frames to extract spatio-temporal features. The aim of this work is to fuse the convolution layers from 2D and 3D CNNs to allow temporal encoding with fewer parameters ...
    • Separating mobility from mobile agents 

      Marzullo, Keith; Lauvset, Kåre J.; Johansen, Dag (Research report; Forskningsrapport, 2001-01-16)
      In this paper we argue that the traditional model of a mobile agent provides a poor programming structure. We base our argument on our experience since 1993 in building distributed applications and mobile agent platforms. We have observed that every distributed applications contain three distinct aspects, which we call function, mobility and management. Separating an application into these three ...
    • Shrinkage estimation of rate statistics 

      Holsbø, Einar Jakobsen; Perduca, Vittorio (Journal article; Tidsskriftartikkel; Peer reviewed, 2018-10-08)
      This paper presents a simple shrinkage estimator of rates based on Bayesian methods. Our focus is on crime rates as a motivating example. The estimator shrinks each town’s observed crime rate toward the country-wide average crime rate according to town size. By realistic simulations we confirm that the proposed estimator outperforms the maximum likelihood estimator in terms of global risk. We also ...
    • Simplified Device-Transparent Personal Storage 

      Kittilsland, Andreas (Master thesis; Mastergradsoppgave, 2016-05-15)
      The number of personal computers we use every day has increased significantly the last couple of years, where the common model is a setup where each device has its own storage with separate files and applications. This forces the user to think in a certain way about files and applications, where they are to a degree bound to a device unless the user specifically moves the files, or installs/uninstalls ...
    • Simulating the Arctic Tundra Battery performance at sub-zero temperatures 

      Heggeli, Erik (Mastergradsoppgave; Master thesis, 2023-05-15)
      The Arctic Tundra is an extremely cold desert-like environment. It is the home to many different species of animals and plants. With the oncoming threat of climate change, this biome is at risk of losing its biodiversity. This disruption of the Arctic Tundra caused by climate change, is what researchers at COAT with the assistance of UiT’s DAO project is trying to monitor. To be able to achieve this ...
    • Single image dehazing for a variety of haze scenarios using back projected pyramid network 

      Singh, Ayush; Bhave, Ajay; Prasad, Dilip K. (Conference object; Konferansebidrag, 2020)
      Learning to dehaze single hazy images, especially using a small training dataset is quite challenging. We propose a novel generative adversarial network architecture for this problem, namely back projected pyramid network (BPPNet), that gives good performance for a variety of challenging haze conditions, including dense haze and inhomogeneous haze. Our architecture incorporates learning of multiple ...
    • Sixteen years of ICPC use in Norwegian primary care : looking through the facts 

      Bassøe, Carl-Fredrik; Botsis, Taxiarchis; Hartvigsen, Gunnar (Journal article; Tidsskriftartikkel; Peer reviewed, 2010)
    • Skynet: A distributed, autonomous filesystem 

      Aas, Svein Ove (Master thesis; Mastergradsoppgave, 2010-05)
      Existing networked filesystems are usually either client/server - allowing storage only on one node - hard to use, or both. The advanced ones also like to use their own on-disk format, complicating migration both ways. Skynet attempts to remedy this. It is a distributed filesystem with master/slave redundancy that is easy to use, relatively safe for your data and can be easily converted to/from ...
    • Sleep Monitoring with Wearable Sensor Data in an eCoach Recommendation System: A Conceptual Study with Machine Learning Approach 

      Chatterjee, Ayan; Prinz, Andreas; Pahari, Nibedita; Das, Jishnu; Riegler, Michael (Chapter; Bokkapittel, 2023-04-25)
      The collective effects of sleep loss and sleep disorders are correlated with many adverse health consequences, including increased risk of high blood pressure, obesity, diabetes, depressive state, and cardiovascular symptoms. Research in eHealth can provide methods to enrich personal health care with information and communication technologies (ICTs). An eCoach system may allow people to manage a ...
    • Slicer 

      Knutsen, Øystein (Mastergradsoppgave; Master thesis, 2021-09-15)
      Explorative data visualization is a widespread tool for gaining insights from datasets. Investigating data in linked visualizations lets users explore potential relationships in their data at will. Furthermore, this type of analysis does not require any technical knowledge, widening the userbase from developers to anyone. Implementing explorative data visualizations in web browsers makes data analysis ...
    • Smart contract formation enabling energy-as-a-service in a virtual power plant 

      Mishra, Sambeet; Crasta, Cletus John; Bordin, Chiara; Mateo-Fornés, Jordi (Journal article; Tidsskriftartikkel; Peer reviewed, 2021-10-22)
      Energy as a service (EaaS) is an emerging business model that enables the otherwise passive energy consumers to play an active role and participate in the energy utility services. This platform is formed through smart contracts registering peer-to-peer (P2P) transactions of energy through price and quantity. Many industries, including finance, have already leveraged smart contracts to introduce ...
    • Smart contract formation enabling energy-as-a-service in a virtual power plant 

      Mishra, Sambeet; John Crasta, Cletus; Bordin, Chiara; Mateo‐Fornés, Jordi (Journal article; Tidsskriftartikkel; Peer reviewed, 2021-10-22)
      Energy as a service (EaaS) is an emerging business model that enables the otherwise passive energy consumers to play an active role and participate in the energy utility services. This platform is formed through smart contracts registering peer-to-peer (P2P) transactions of energy through price and quantity. Many industries, including finance, have already leveraged smart contracts to introduce ...
    • Smart Energy and power systems modelling: an IoT and Cyber-Physical Systems perspective, in the context of Energy Informatics 

      Bordin, Chiara; Håkansson, Anne; Mishra, Sambeet (Journal article; Tidsskriftartikkel; Peer reviewed, 2020-10-02)
      This paper aims at identifying the key role of ”Smart Energy and Power Systems Modelling”, within the context of Energy Informatics. The main objective is to describe how the specific subject of ”Smart Energy and Power Systems Modelling” can give a key contribution within the novel domain of Energy Informatics, by successfully linking and integrating the different disciplines involved. First the ...
    • Sneak 

      Syversen, Torkel (Mastergradsoppgave; Master thesis, 2023-05-15)
      Secure multiparty computation (SMC) is a technique that allows multiple parties to jointly compute a function while keeping their inputs private. This technique has gained significant attention due to its potential applications in various fields, including privacy-preserving healthcare, politics and finance. SMC involves a set of protocols that enable parties to achieve secure computation and ...
    • Social media, physical activity and autism: better or bitter together? A scoping review 

      Gabarron, Elia; Henriksen, André; Nordahl-Hansen, Anders (Journal article; Tidsskriftartikkel; Peer reviewed, 2022-08-22)
      This review provides an overview of the existing research on social media, autism, and physical activity. We searched for publications on PubMed, PsycInfo, Embase, Education source, ERIC, IEEE Xplore, and the proceedings from conferences on health informatics and autism. Eight studies were included in this review. Studies reported mixed results on the link between social media, physical activity, ...
    • SoCodeCNN: Program Source Code for Visual CNN Classification Using Computer Vision Methodology 

      Dey, Somdip; Singh, Amit Kumar; Prasad, Dilip K.; McDonald-Maier, Klaus D. (Journal article; Tidsskriftartikkel; Peer reviewed, 2019-10-24)
      Automated feature extraction from program source-code such that proper computing resources could be allocated to the program is very difficult given the current state of technology. Therefore, conventional methods call for skilled human intervention in order to achieve the task of feature extraction from programs. This research is the first to propose a novel human-inspired approach to automatically ...
    • Software Defined Radio Based Avalanche Beacon Receiver 

      Hofsøy-Woie, Vetle (Master thesis; Mastergradsoppgave, 2024-01-24)
      Annually, avalanches claim an average of 100 lives, and many more are injured. For victims buried by an avalanche, time is of the essence. If not rescued within 15 minutes, the victim only has a 10% probability of survival. Commonly, the people venturing into avalanche-prone areas equips avalanche beacons. These devices work as small radio transmitters transmitting a signal at 457 kHz once each ...
    • Some hints on the theory and practice of authentication in distributed systems 

      Stabell-Kulø, Tage; Bottoni, Andrea (Research report; Forskningsrapport, 2003-05-17)
      Authentication in Distributed Systems: Theory and Practice provides considerable insight. However, it can be hard to read, as many details are left out, probably for brevity; it is still 45 pages long. We provide detailed explanations of tricky points.