Blar i Department of Informatics på tittel
Viser treff 944-963 av 1199
-
Safety and security of autonomous vessels. Based on the Yara Birkeland project
(Master thesis, 2020-05-05)Yara Birkeland will be the world’s first fully electric and autonomous container vessel with zero emission. It is being developed by Kongsberg and Yara. This is one of the autonomous projects ongoing in the maritime ... -
Salmon louse (Lepeophtheirus salmonis) transcriptomes during post molting maturation and egg production, revealed using EST-sequencing and microarray analysis
(Peer reviewed; Journal article, 2008-03-10)Background Lepeophtheirus salmonis is an ectoparasitic copepod feeding on skin, mucus and blood from salmonid hosts. Initial analysis of EST sequences from pre adult and adult stages of L. salmonis revealed a large proportion ... -
The salmon louse genome may be much larger than sequencing suggests
(Journal article; Peer reviewed, 2022)The genome size of organisms impacts their evolution and biology and is often assumed to be characteristic of a species. Here we present the first published estimates of genome size of the ecologically and economically ... -
SAR and Optical Satellite Imagery Automated Matching using Machine Learning
(Master thesis, 2022-11-21) -
SBMLmod: a Python-based web application and web service for efficient data integration and model simulation
(Peer reviewed; Journal article, 2017-06-24)Background: Systems Biology Markup Language (SBML) is the standard model representation and description language in systems biology. Enriching and analysing systems biology models by integrating the multitude of available ... -
Scalable Learning of Bayesian Networks Using Feedback Arc Set-Based Heuristics
(Doctoral thesis, 2023-11-10)Bayesianske nettverk er en viktig klasse av probabilistiske grafiske modeller. De består av en struktur (en rettet asyklisk graf) som beskriver betingede uavhengighet mellom stokastiske variabler og deres parametere (lokale ... -
Scalable Readout for Proton CT
(Master thesis, 2020-10-02)Denne oppgaven er en del av arbeidet med å utvikle en prototype detektor for proton CT. Den tar for seg første del av data prosessering nødvendig får rekonstruksjon og analyse av dataene og debugging av systemet.. -
Scaling the scales - A suggested improvement to IBM's Intelligent Recommendation Algorithm
(Master thesis, 2014-11-20)Recommender systems appear in a large variety of applications, and their use has become very common in recent years. As a lot of money can be made by companies having a better recommender system than their competitors, ... -
Scaling Up Medical Visualization : Multi-Modal, Multi-Patient, and Multi-Audience Approaches for Medical Data Exploration, Analysis and Communication
(Doctoral thesis, 2022-09-02)Medisinsk visualisering er en av de mest applikasjonsrettede områdene av visualiseringsforsking. Tett samarbeid med medisinske eksperter er nødvendig for å tolke medisinsk bildedata og lage betydningsfulle visualiseringsteknikker ... -
ScrollyVis: Interactive Visual Authoring of Guided Dynamic Narratives for Scientific Scrollytelling
(Journal article; Peer reviewed, 2023)Visual stories are an effective and powerful tool to convey specific information to a diverse public. Scrollytelling is a recent visual storytelling technique extensively used on the web, where content appears or changes ... -
Searchable Symmetric Encryption and its applications
(Master thesis, 2022-06-01)In the age of personalized advertisement and online identity profiles, people’s personal information is worth more to corporations than ever. Storing data in the cloud is increasing in popularity due to bigger file sizes ... -
The Second Rewrite Engines Competition
(Journal article, 2009-06-29)The Second Rewrite Engines Competition (REC) was celebrated as part of the 7th Workshop on Rewriting Logic and its Applications (WRLA 2008). In this edition of the competition participated five systems, namely ASF+SDF, ... -
Second-Order Finite Automata
(Journal article; Peer reviewed, 2022)Traditionally, finite automata theory has been used as a framework for the representation of possibly infinite sets of strings. In this work, we introduce the notion of second-order finite automata, a formalism that combines ... -
Secure coding through integration of public information security sources to eclipse development environment
(Master thesis, 2022-06-01)The use of open source components in software development has been growing at a rapid pace for a number of years. This increase in use of open source software is accompanied by an increase in the risk of security ... -
Secure, reliable, and efficient communication over the wiretap channel
(Master thesis, 2022-06-01)Secure wireless communication between devices is essential for modern communication systems. Physical-layer security over the wiretap channel may provide an additional level of secrecy beyond the current cryptographic ... -
Security analysis of electronic voting and online banking systems
(Doctoral thesis, 2007-08-29)The main focus of this dissertation is on security analysis of electronic voting and online banking systems. Six papers form the basis of the thesis and include the following topics: a model for analysis of voting systems, ... -
Security Analysis Of Lightweight Schemes for RFID Systems
(Doctoral thesis, 2012-08-08)This thesis mainly examines the security analysis of lightweight protocols proposed for providing security and privacy for RFID systems. To achieve this goal, first we give a brief introduction of RFID systems. The ... -
Security Analysis of two Distance-Bounding Protocols
(Conference lecture, 2012)In this paper, we analyze the security of two recently proposed distance bounding protocols called the “Hitomi” and the “NUS” protocols. Our results show that the claimed security of both protocols has been overestimated. ... -
Security API for Java ME: secureXdata
(Master thesis, 2012-02-24)The usage of mobile phones, PDAs and other mobile communication devices in the context of health is an emerging part of eHealth. In 2010 the American National Institutes of Health defined mHealth as "The delivery of ... -
Security in cloud computing and virtual environments
(Master thesis, 2015-09-14)Cloud computing is a big buzzwords today. Just watch the commercials on TV and I can promise that you will hear the word cloud service at least once. With the growth of cloud technology steadily rising, and everything from ...