Search results for "550"
showing 10 items of 1192 documents
Introducing Internet-based services in the mountain areas of Nepal: An asset pentagon perspective
2012
Published version of an article from the journal: Information Technologies & International Development. Also available from the publisher: http://itidjournal.org/itid/article/view/916 Information and communication technology for development (ICT4D) projects can only be considered successful if they lead to some kind of individual, social, or economic development. The beneªts of introducing ICT4D projects in developing countries are yet to be realized, particularly those introduced in mountainous and remote areas. Our study addresses this knowledge gap by analyzing the Nepal Wireless Networking Project from the mountain areas in Nepal using the assets pentagon model (APM). The main contribut…
Exploring knowledge work practices and evolution in distributed networks of practice
2010
Published version of an article from the journal:Electronic Journal of Knowledge Management Also available from the publisher: http://www.ejkm.com/volume-8/v8-1/v8-i1-art7.htm This paper derives from a longitudinal study conducted in a multinational company. Through an interpretive case study approach, we have explored the phenomenon of knowledge networking in distributed work. More specifically, we have focused on the evolution patterns in a particular knowledge networking structure denoted as distributed networks of practice. The paper conceptualizes this kind of network of practice as an information and communication technology (ICT) facilitated dynamic relationship of participants that …
Advancements in Safe Deep Reinforcement Learning for Real-Time Strategy Games and Industry Applications
2022
Offshore Wind Data Integration
2014
Doktorgradsavhandling i informasjons- og kommunikasjonsteknologi, Universitetet i Agder, Grimstad, 2014 Using renewable energy to meet the future electricity consumption and to reduce environmental impact is a significant target of many countries around the world. Wind power is one of the most promising renewable energy technologies. In particular, the development of offshore wind power is increasing rapidly due to large areas of wind resources. However, offshore wind is encountering big challenges such as effective use of wind power plants, reduced cost of installation as well as operation and maintenance (O&M). Improved O&M is likely to reduce the hazard exposure of the employees, increas…
Implicit Wiener Filtering for Speech Enhancement In Non-Stationary Noise
2021
Novel Tsetlin Machine Mechanisms for Logic-based Regression and Classification with Support for Continuous Input, Clause Weighting, Confidence Assess…
2022
On merging the fields of neural networks and adaptive data structures to yield new pattern recognition methodologies
2011
Published version of a chapter from the book Pattern Recognition and Machine Intelligence. Also available from the publisher at http://dx.doi.org/10.1007/978-3-642-21786-9_3 The aim of this talk is to explain a pioneering exploratory research endeavour that attempts to merge two completely different fields in Computer Science so as to yield very fascinating results. These are the well-established fields of Neural Networks (NNs) and Adaptive Data Structures (ADS) respectively. The field of NNs deals with the training and learning capabilities of a large number of neurons, each possessing minimal computational properties. On the other hand, the field of ADS concerns designing, implementing an…
Cryptographic Enforcement of Attribute-based Authentication
2016
Doktorgradsavhandling, This dissertation investigates on the cryptographic enforcement about attributebased authentication (ABA) schemes. ABA is an approach to authenticate users via attributes, which are properties of users to be authenticated, environment conditions such as time and locations. By using attributes in place of users’ identity information, ABA can provide anonymous authentication, or more specifically, ABA enables to keep users anonymous from their authenticators. In addition, the property of least information leakage provides better protection for users’ privacy compared with public key based authentication approaches. These properties make it possible to apply ABA schemes …
Quantization in Graph Convolutional Neural Networks
2021
Simulation Models in eGovernment Using System Dynamics
2017
Doktorgradsavhandling ved Universitetet i Agder, Institutt for infomasjons- og kommunikasjonsteknologi, 2017 System Dynamics (SD) is a method to build simulation models using computers, to study the behaviour of systems, and apply what-if scenarios aiming at achieving optimal policy design. In this thesis, we are introducing an SD approach in modelling the eGovernment. The thesis is based on two topics or essays: eParticipation and eAccessibility as examples of eGovernment areas that SD models have not been used in before, to show how SD can be used in modelling and supporting decisions in the field of eGovernment, especially in new areas. Although this research is part of the eGovMon proje…