Search results for "formas"

showing 10 items of 979 documents

Hidden Markov Model Based Machine Learning for mMTC Device Cell Association in 5G Networks

2019

Massive machine-type communication (mMTC) is expected to play a pivotal role in emerging 5G networks. Considering the dense deployment of small cells and the existence of heterogeneous cells, an MTC device can discover multiple cells for association. Under traditional cell association mechanisms, MTC devices are typically associated with an eNodeB with highest signal strength. However, the selected eNodeB may not be able to handle mMTC requests due to network congestion and overload. Therefore, reliable cell association would provide a smarter solution to facilitate mMTC connections. To enable such a solution, a hidden Markov model (HMM) based machine learning (ML) technique is proposed in …

Computer sciencebusiness.industryAssociation (object-oriented programming)Reliability (computer networking)05 social sciences050801 communication & media studiesMachine learningcomputer.software_genreNetwork congestion0508 media and communicationsEnodeB0502 economics and business050211 marketingArtificial intelligenceState (computer science)Hidden Markov modelbusinessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550computer5GData transmissionICC 2019 - 2019 IEEE International Conference on Communications (ICC)
researchProduct

An Empirical Investigation of Performance Overhead in Cross-Platform Mobile Development Frameworks

2020

AbstractThe heterogeneity of the leading mobile platforms in terms of user interfaces, user experience, programming language, and ecosystem have made cross-platform development frameworks popular. These aid the creation of mobile applications – apps – that can be executed across the target platforms (typically Android and iOS) with minimal to no platform-specific code. Due to the cost- and time-saving possibilities introduced through adopting such a framework, researchers and practitioners alike have taken an interest in the underlying technologies. Examining the body of knowledge, we, nonetheless, frequently encounter discussions on the drawbacks of these frameworks, especially with regard…

Computer sciencebusiness.industryMobile appMobile apps020206 networking & telecommunications020207 software engineering02 engineering and technologyData scienceBody of knowledgeDevelopment approachesUser experience designCross-platform0202 electrical engineering electronic engineering information engineeringCross-platform developmentMobile developmentAndroid (operating system)User interfacePerformance benchmarkEmpirical evidencebusinessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Software
researchProduct

Reliable Underlay Device-to-Device Communications on Multiple Channels

2019

Device-to-device (D2D) communications provide a substantial increase in spectrum usage and efficiency by allowing nearby users to communicate directly without passing their packets through the base station (BS). In previous works, proper channel assignment and power allocation algorithms for sharing of channels between cellular users and D2D pairs, usually require exact knowledge of the channel-state-information (CSI). However, due to the non-stationary wireless environment and the need to limit the communication and computation overheads, obtaining perfect CSI in the D2D communication scenario is generally not possible. In this work, we propose a joint channel assignment and power allocati…

Computer sciencebusiness.industryNetwork packetComputationReliability (computer networking)05 social sciences050801 communication & media studies020302 automobile design & engineeringThroughput02 engineering and technologyBase station0508 media and communications0203 mechanical engineeringComputer Science::Networking and Internet ArchitectureWirelessUnderlaybusinessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Computer Science::Information TheoryCommunication channelComputer network2019 IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
researchProduct

Real Models are Really on M0 - Or How to Make Programmers Use Modeling

2020

This paper discusses the term ’model’ and the role of the level M0 in the four-layer metamodeling architecture of MOF/OMG. It illustrates the failures of the OMG MOF standard and how a model is an abstraction, not a description. We apply two simple approaches: (1) observing the use of models (of real or planned systems) in system development, including prototyping, simulations, and models in general, and (2) comparing modeling with programming. These approaches lead to the conclusion that models should be placed on M0, while UML models are model descriptions. This conclusion leads to a better understanding of InstanceSpecification for description of snapshots, and of metamodeling applied to…

Computer sciencebusiness.industrySoftware engineeringbusinessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Peer review
researchProduct

Dynamic Flow-Adaptive Spectrum Leasing with Channel Aggregation in Cognitive Radio Networks.

2020

Cognitive radio networks (CRNs), which allow secondary users (SUs) to dynamically access a network without affecting the primary users (PUs), have been widely regarded as an effective approach to mitigate the shortage of spectrum resources and the inefficiency of spectrum utilization. However, the SUs suffer from frequent spectrum handoffs and transmission limitations. In this paper, considering the quality of service (QoS) requirements of PUs and SUs, we propose a novel dynamic flow-adaptive spectrum leasing with channel aggregation. Specifically, we design an adaptive leasing algorithm, which adaptively adjusts the portion of leased channels based on the number of ongoing and buffered PU …

Computer sciencechannel aggregating02 engineering and technologyBlocking (statistics)lcsh:Chemical technologyBiochemistryArticleAnalytical Chemistry0203 mechanical engineeringflow-adaptive spectrum leasing0202 electrical engineering electronic engineering information engineeringlcsh:TP1-1185Electrical and Electronic EngineeringInstrumentationVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550business.industryQuality of serviceSpectrum (functional analysis)020302 automobile design & engineering020206 networking & telecommunicationsAtomic and Molecular Physics and OpticsCognitive radioTransmission (telecommunications)Flow (mathematics)cognitive radio networksbusinessCommunication channelComputer networkSensors (Basel, Switzerland)
researchProduct

An exploration of semi-supervised text classification

2021

Master's thesis in Information- and communication technology (IKT590) Obtaining labeled data to train natural language machine learning algorithms is often expensive and time-consuming, while unlabeled data usually is free and easy to get. Frequently a large amount of labeled data is required by supervised learning to achieve good text classification performance. Semi-supervised learning (SSL) for text classification is an exciting area of research. SSL is a technique exploiting unlabeled and labeled data to achieve better classification performance than using labeled data alone and is particularly useful with limited labeled data. This thesis explores the impact of different parameters on …

ComputingMethodologies_PATTERNRECOGNITIONIKT590VDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct

Generative Adversarial Networks for Improving Face Classification

2017

Master's thesis Information- and communication technology IKT590 - University of Agder 2017 Facial recognition can be applied in a wide variety of cases, including entertainment purposes and biometric security. In this thesis we take a look at improving the results of an existing facial recognition approach by utilizing generative adversarial networks to improve the existing dataset. The training data was taken from the LFW dataset[4] and was preprocessed using OpenCV[2] for face detection. The faces in the dataset was cropped and resized so every image is the same size and can easily be passed to a convolutional neural network. To the best of our knowledge no generative adversarial network…

ComputingMethodologies_PATTERNRECOGNITIONIKT590VDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct

More than experience? On the unique opportunities of virtual reality to afford a holistic experiential learning cycle

2021

Virtual reality has been proposed as a promising technology for higher education since the combination of immersive and interactive features enables experiential learning. However, previous studies did not distinguish between the different learning modes of the four-stage experiential learning cycle (i.e., concrete experience, reflective observation, abstract conceptualization, and active experimentation). With our study, we contribute a deeper understanding of how the unique opportunities of virtual reality can afford each of the four experiential learning modes. We conducted three design thinking workshops with interdisciplinary teams of students and lecturers. These workshops resulted in…

ConceptualizationHigher educationComputer Networks and CommunicationsComputer scienceProcess (engineering)business.industry05 social sciences050301 educationDesign thinkingVirtual realityExperiential learningFocus groupComputer Science ApplicationsEducationAngewandte KognitionswissenschaftHuman–computer interaction0502 economics and businessSelection (linguistics)ComputingMilieux_COMPUTERSANDEDUCATIONbusiness0503 educationVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550050203 business & management
researchProduct

Slaying the SA-Demons – Humans vs. Technology – A Content analysis

2021

This paper examines Situation Awareness (SA) and the application of Endsley’s SA-Demons in different contexts and research areas. We perform content analysis to examine how they are used, and to what degree they are perceived as stemming from human-error or weaknesses in technology and if any suggestions for mitigation are primarily focused on the human or the technology side. Based on our findings, we propose Universal Design as a tool that can counter the effects of the SA-Demons by improving the usability and accessibility of SA-supporting technology and thereby removing barriers to SA, rather than challenging the users to overcome not only barriers that are a result of the complexity of…

Content analysesHuman-errorsCrisis managementSA-DemonsSituation awarenessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Universal design
researchProduct

Design and Implementation of Real-Time Kitchen Monitoring and Automation System Based on Internet of Things

2022

Automation can now be found in nearly every industry. However, home automation has yet to reach Pakistan. This paper presents an Internet of Things smart kitchen project that includes automation and monitoring. In this project, a system was developed that automatically detects the kitchen temperature. It also monitors the humidity level in the kitchen. This system includes built-in gas detection sensors that detect any gas leaks in the kitchen and notify the user if the gas pressure in the kitchen exceeds a certain level. This system also allows the user to remotely control appliances such as freezers, ovens, and air conditioners using a mobile phone. The user can control gas levels using t…

Control and OptimizationRenewable Energy Sustainability and the EnvironmentInternet of Things; smart kitchen; monitoring system; automation system; home appliancesEnergy Engineering and Power TechnologyBuilding and ConstructionElectrical and Electronic EngineeringEngineering (miscellaneous)VDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Energy (miscellaneous)
researchProduct