Search results for "590"
showing 10 items of 644 documents
Ancestry and demography and descendants of Iron Age nomads of the Eurasian Steppe
2017
During the 1st millennium before the Common Era (BCE), nomadic tribes associated with the Iron Age Scythian culture spread over the Eurasian Steppe, covering a territory of more than 3,500 km in breadth. To understand the demographic processes behind the spread of the Scythian culture, we analysed genomic data from eight individuals and a mitochondrial dataset of 96 individuals originating in eastern and western parts of the Eurasian Steppe. Genomic inference reveals that Scythians in the east and the west of the steppe zone can best be described as a mixture of Yamnaya-related ancestry and an East Asian component. Demographic modelling suggests independent origins for eastern and western g…
La vocalidad del violín en el norte de Italia en torno a 1600
2021
Throughout the present research I intend to demonstrate the powerful link between the vocal practice in accompanied monody and the way Early Italian violin music ought to be interpreted. Due to the scarce amount of articulation and ornamentation in this music, I consider that historical criteria should be found in order to back up the subjective choices in its performance. According to this, I focus on reviewing sources that describe the vocal practice around 1600, but also contemporary sources in which we can find instructions addressed to bow instruments. Besides, a catalogue of articulations and ornamentations present in early editions of printed violin music is attached. Last, I comment…
Real-Life Experiments based on IQRF IoT Testbed: From Sensors to Cloud
2018
Master's thesis Information- and communication technology IKT590 - University of Agder 2018 Internet of things (IoT) is the next generation internet technology which connects devices and objects intelligently to control data collected by diverse types of sensors, radio frequency identification and other physical objects. To address the challenges in IoT such as integrating artificial intelligent techniques with IoT concept, developing green IoT technologies and combining IoT and cloud computing, various platforms which support reliable and low power wireless connectivity are required. IQRF is a recently developed platform for wireless connectivity. It provides low power, low speed, reliable…
Ontology based study planning and classification of university subjects
2015
Masteroppgave informasjons- og kommunikasjonsteknologi - Universitetet i Agder, 2015 This is first and foremost a research project into study planning at the University of Agder. What tools are available for students now, and can an ontology help make it easier? Having a plan for your education is important, and not having proper tools for this can be a frustration for many students. In this thesis I propose an ontology aimed at helping students plan their studies, by giving a graphical presentation of how courses are linked together. I also look at current ways for students to plan their study, and compare them to the ontology. The focus of the ontology is primarily on the bachelors and ma…
Feasibility analysis for forecasting inflow of unplanned work using machine learning techniques
2021
Master´s thesis in Information and Communication Technology (IKT590), University of Agder, Grimstad
Adaptive Backbone and Link Correlation based Data Transmission Schemes for Wireless Sensor Networks
2015
Masteroppgave informasjons- og kommunikasjonsteknologi - Universitetet i Agder, 2015 One of the main challenges faced by modern wireless sensor networks (WSN) is rapid energy depletion of individual sensor nodes. In many applications, sensor nodes are deployed in outdoor environments and it is difficult to replace or recharge node batteries. Depending on network topology and the transmission schemes implemented, certain nodes could have higher energy consumption compared with other nodes. In highly unbalanced load distributions this could lead to early total energy depletion of a critical node in the topology resulting in what is known as an energy hole in the network. Considering these fac…
Towards Automated Human Identification Using Dental X-ray Images
2015
Masteroppgave informasjons- og kommunikasjonsteknologi - Universitetet i Agder, 2015 Systems for automated human identification from dental X-ray images can be used to greatly reduce the necessary effort spent today by dental forensics experts. In this work a new methodology is proposed to create a system for automated dental X-ray identification. The methodology includes both state-of-the-art methods and a novel method for separating a dental X-ray image into individual teeth. The novel method is based on lowest cost pathfinding and is shown to achieve comparable results to the state-of-the-art. In experiments it is able to separate 88.7% of the teeth in the test images correctly. The iden…
Distributed Resource Allocation for Device-to-Device Communication in LTE/LTE-A Networks
2015
Masteroppgave informasjons- og kommunikasjonsteknologi - Universitetet i Agder, 2015 Currently, 3GPP is working on device-to-device (D2D) communica- tions, which is regarded as a part of 5G mobile communication systems. This thesis focuses on allocation of radio resources, based on a scenario where out-of-coverage user equipments (UEs) communicate with a base station (BS), through an user equipment relay (UE-R) located within the cell coverage. Two algorithms have been developed, one focusing on adjusting di erent parameters to achieve higher performance in the de- veloped system. Whilst the other algorithm targets at battery depended resource allocation including four battery control alloc…
Searchable Privacy-Enabled Information and Event Management Solution.
2015
Masteroppgave informasjons- og kommunikasjonsteknologi - Universitetet i Agder, 2015 With network traffic proliferating over the last couple of decades, there is an increasing need to monitor security information in order to prevent and resolve network security threats. A Security Information and Event Management (SIEM) solution collects all the alerts that the various Intrusion Detection and Prevention Systems (IDS/IDP or IDPS) generates, as well as security logs from various other systems, into one database so that the security analyst (SA) can more easily get an overview of the threat activity. A privacy enhanced anonymization and deanonymization protocol (Anonymiser/ Reversible Anonymis…
Towards Detecting Textual Plagiarism Using Machine Learning Methods
2015
Masteroppgave informasjons- og kommunikasjonsteknologi - Universitetet i Agder, 2015 Textual plagiarism is passing off someone else’s text as your own. The current state of the art in plagiarism detection performs well, but often uses a series of manually determined thresholds of metrics in order to determine whether an author is guilty of performing plagiarism or not. These thresholds are optimized for a single data set and are not optimal for all situations or forms of plagiarism. The detection methodologies also require a professional familiar with the algorithms in order to be properly adjusted, due to their complexity. Using a pre-classified data set, machine learning methods allow tea…