Search results for "IKT 590"
showing 10 items of 14 documents
Ontology based study planning and classification of university subjects
2015
Masteroppgave informasjons- og kommunikasjonsteknologi - Universitetet i Agder, 2015 This is first and foremost a research project into study planning at the University of Agder. What tools are available for students now, and can an ontology help make it easier? Having a plan for your education is important, and not having proper tools for this can be a frustration for many students. In this thesis I propose an ontology aimed at helping students plan their studies, by giving a graphical presentation of how courses are linked together. I also look at current ways for students to plan their study, and compare them to the ontology. The focus of the ontology is primarily on the bachelors and ma…
Feasibility analysis for forecasting inflow of unplanned work using machine learning techniques
2021
Master´s thesis in Information and Communication Technology (IKT590), University of Agder, Grimstad
Adaptive Backbone and Link Correlation based Data Transmission Schemes for Wireless Sensor Networks
2015
Masteroppgave informasjons- og kommunikasjonsteknologi - Universitetet i Agder, 2015 One of the main challenges faced by modern wireless sensor networks (WSN) is rapid energy depletion of individual sensor nodes. In many applications, sensor nodes are deployed in outdoor environments and it is difficult to replace or recharge node batteries. Depending on network topology and the transmission schemes implemented, certain nodes could have higher energy consumption compared with other nodes. In highly unbalanced load distributions this could lead to early total energy depletion of a critical node in the topology resulting in what is known as an energy hole in the network. Considering these fac…
Towards Automated Human Identification Using Dental X-ray Images
2015
Masteroppgave informasjons- og kommunikasjonsteknologi - Universitetet i Agder, 2015 Systems for automated human identification from dental X-ray images can be used to greatly reduce the necessary effort spent today by dental forensics experts. In this work a new methodology is proposed to create a system for automated dental X-ray identification. The methodology includes both state-of-the-art methods and a novel method for separating a dental X-ray image into individual teeth. The novel method is based on lowest cost pathfinding and is shown to achieve comparable results to the state-of-the-art. In experiments it is able to separate 88.7% of the teeth in the test images correctly. The iden…
Distributed Resource Allocation for Device-to-Device Communication in LTE/LTE-A Networks
2015
Masteroppgave informasjons- og kommunikasjonsteknologi - Universitetet i Agder, 2015 Currently, 3GPP is working on device-to-device (D2D) communica- tions, which is regarded as a part of 5G mobile communication systems. This thesis focuses on allocation of radio resources, based on a scenario where out-of-coverage user equipments (UEs) communicate with a base station (BS), through an user equipment relay (UE-R) located within the cell coverage. Two algorithms have been developed, one focusing on adjusting di erent parameters to achieve higher performance in the de- veloped system. Whilst the other algorithm targets at battery depended resource allocation including four battery control alloc…
Searchable Privacy-Enabled Information and Event Management Solution.
2015
Masteroppgave informasjons- og kommunikasjonsteknologi - Universitetet i Agder, 2015 With network traffic proliferating over the last couple of decades, there is an increasing need to monitor security information in order to prevent and resolve network security threats. A Security Information and Event Management (SIEM) solution collects all the alerts that the various Intrusion Detection and Prevention Systems (IDS/IDP or IDPS) generates, as well as security logs from various other systems, into one database so that the security analyst (SA) can more easily get an overview of the threat activity. A privacy enhanced anonymization and deanonymization protocol (Anonymiser/ Reversible Anonymis…
Towards Detecting Textual Plagiarism Using Machine Learning Methods
2015
Masteroppgave informasjons- og kommunikasjonsteknologi - Universitetet i Agder, 2015 Textual plagiarism is passing off someone else’s text as your own. The current state of the art in plagiarism detection performs well, but often uses a series of manually determined thresholds of metrics in order to determine whether an author is guilty of performing plagiarism or not. These thresholds are optimized for a single data set and are not optimal for all situations or forms of plagiarism. The detection methodologies also require a professional familiar with the algorithms in order to be properly adjusted, due to their complexity. Using a pre-classified data set, machine learning methods allow tea…
Domestic Electricity Demand and Peak Predictions Considering Influence of Weather Parameters
2015
Masteroppgave informasjons- og kommunikasjonsteknologi - Universitetet i Agder, 2015 (Konfidensiell til/confidential until 01.07.2020)
Design, implementation and analysis of a theft-resistant password manager based on Kamouflage architecture
2015
Masteroppgave informasjons- og kommunikasjonsteknologi - Universitetet i Agder, 2015 As a solution for helping companies and users in the constant security dilemma of obtaining and using passwords in the securest ways possible, password managers have become custom around the globe. The design architecture on what development of password managers are based on, preserving authenticity, usability and reliability are principles that keep systems secure and defend against attacks or unfortunate circumstances. The design principles however, have changed little over time. After researching password managers and analyzing overall security, we use our findings to develop a design based on the implem…
Clustered File Type Identification
2015
Masteroppgave informasjons- og kommunikasjonsteknologi - Universitetet i Agder, 2015 This thesis examines the possibility of expanding the current field of research for file type identification in Digital Forensics. A proposed solution is presented where unsupervised clustering and supervised classification are combined. The experimentation of the proposed solution increases the speed of file type identification, however with a decrease of total identification accuracy. A technique of unsupervised continuous learning is also presented, effectively making the proposed solution capable of adapting to the environment by learning from the test data while performing file type identification. In …