Search results for "systemer"
showing 10 items of 132 documents
Familiarity with digital twin totality: Exploring the relation and perception of affordances through a Heideggerian perspective
2022
The concept of affordances has become central in information systems literature. However, existing perspectives fall short in providing details on the relational aspect of affordances, which can influence actors' perception of them. To increase granularity and specificity in this regard, researchers have suggested that it be supplemented with other concepts or theories. In this article, we argue that the Heideggerian concepts of ‘familiarity’ and ‘referential totality’ are well suited for increasing our understanding of the relational aspects of affordances in information systems research. To explore this idea, we conducted a case study of a project concerning the development of a digital t…
Secure and scalable dataprocessing and communications for an Animal Tracking System
2003
Masteroppgave i informasjons- og kommunikasjonsteknologi 2003 - Høgskolen i Agder, Grimstad Modern technology is constantly being employed in new fields, by new industries and people. The cost of advanced technological equipment decreases continously, and equipment that was reserved for people and corporations with a lot of money has now become household products. This enables many interesting ideas and projects, Kitron Development’s radiocollar project being one of them. Kitron Development is involved in a project to track the position of animals by substituting the traditional bell collar with a collar that contains a GPS receiver. The collar transmits its position to a base station using…
One coast, two systems: Regional innovation systems and entrepreneurial discovery in Western Norway
2021
This paper introduces an analytical framework for understanding how specialized and diversified regional innovation system (RIS) differ in the way an entrepreneurial discovery process (EDP) is likely to unfold. To analytically explore the proposed framework, we deploy a sequential explanatory design approach, using quantitative data to analyze the regional industry structure of the city regions of Bergen and Stavanger in Western Norway, followed by a qualitative analysis of interviews with key stakeholders in both regions. We find that the city regions face unique challenges that align with an understanding of their respective RIS categorization, providing evidence that the framework propos…
Feasibility analysis for forecasting inflow of unplanned work using machine learning techniques
2021
Master´s thesis in Information and Communication Technology (IKT590), University of Agder, Grimstad
Evaluation of IP over Bluetooth
2002
Masteroppgave i informasjons- og kommunikasjonsteknologi 2002 - Høgskolen i Agder, Grimstad The increasing use of Wireless technologies suggest that this kind of technology has a bright future. Today the most popular Wireless Local Area Networks are WLAN 802.11 and Bluetooth. They both have their strengths in different environments. Bluetooth was not initially an Internet technology, but over the years the focus on implementing Bluetooth nodes with Internet capability has increased. When we want to run IP over Bluetooth we need some kind of gateway to the Internet from Bluetooth, a network access point. This will be an important device in the thesis. The Bluetooth Special Interest Group has…
IPv6 : prospects and problems : a technical and management investigation into the deployment of IPv6
2003
Masteroppgave i informasjons- og kommunikasjonsteknologi 2003 - Høgskolen i Agder, Grimstad IPv4 has been used for over twenty years, and will most likely be used in many years ahead. However, we are now experiencing that the IPv4 address space is running out, resulting in restrictions on who will be able to get these types of addresses assigned to them. Methods such as Network Address Translator (NAT) have been developed and implemented in order to save the IPv4 address space. It is said that this is not a good enough solution, as such techniques introduce new problems at the same time solving some. A new version of the Internet Protocol, IPv6, has been developed and is likely to replace I…
Study and performance evaluation of transport layer protocols over heterogeneous radio and satellite networks
2006
Masteroppgave i informasjons- og kommunikasjonsteknologi 2006 - Høgskolen i Agder, Grimstad Satellites have for some years made it possible to transfer data over long distances, and from desolated locations. Due to their natural broadcast ability they have some major advantages compared to terrestrial links. This ability has made satellites a useful tool for military, science, multimedia and wireless communication. Compared to a few years ago, we are today able to make more accurate measurements, in different environments. Sensors have recent years become more intelligent, and can work independently without being controlled by humans or computers. Other improvements are their mobility, and …
Mechanisms for OAM on MPLS in large IP backbone networks
2002
Masteroppgave i informasjons- og kommunikasjonsteknologi 2002 - Høgskolen i Agder, Grimstad The telecom industry has an ongoing work on the Operation and Maintenance (OAM) mechanisms for the MultiProtocol Label Switching (MPLS) technology. We are expecting that this technology will be the future platform for sending Internet Protocol (IP) packets through the backbone networks. OAM functionalities that exist or are proposed for MPLS are: Reachability and failure detection, avoidance of congested routers, Simple Network Management Protocol (SNMP) features, fast rerouting functions, traffic engineering and ad-hoc mechanisms like Ping. Our work shows that through a comparison of OAM mechanisms …
SIP based IP-telephony network security analysis
2004
Masteroppgave i informasjons- og kommunikasjonsteknologi 2004 - Høgskolen i Agder, Grimstad This thesis evaluates the SIP Protocol implementation used in the Voice over IP (VoIP) solution at the fibre/DSL network of Èlla Kommunikasjon AS. The evaluation focuses on security in the telephony service, and is performed from the perspective of an attacker trying to find weaknesses in the network. For each type of attempt by the malicious attacker, we examined the security level and possible solutions to flaws in the system. The conclusion of this analysis is that the VoIP service is exploitable, and that serious improvements are needed to achieve a satisfying level of security for the system.
Security in GPRS
2001
Masteroppgave i informasjons- og kommunikasjonsteknologi 2001 - Høgskolen i Agder, Grimstad GPRS offers the user an “always on” connection to Internet and Intranet. Some of the services may require high level of security. This can be financial transaction over the Internet, or exchange of confidential documents from a company’s Intranet to an employee. It is important to have strong focus on the security, so companies and persons that demand high level of security can take advantage of the services GPRS offered. What normally happens is that the services wins against the security. This is in most cases adequate security for what a normal subscriber requires. This thesis covers which securit…