Now showing items 1029-1048 of 2642

    • Functionalised microwave sensors for real‑time monitoring of copper and zinc concentration in mining‑impacted water 

      Frau, Ilaria; Wylie, Stephen; Byrne, Patrick; Cullen, Jeff; Korostynska, Olga; Mason, Alex (International Journal of Environmental Science and Technology;First Online 16 November 2019, Journal article; Peer reviewed, 2019-11-11)
      Microwave spectroscopy has been identified as a novel and inexpensive method for the monitoring of water pollutants. Integrating microwave sensors with developed coatings is a novel strategy to make the sensing system more ...
    • Future imagery of synthetic food 

      Branconi, Marco Dylan (MAPD;2022, Master thesis, 2022)
      With a constantly growing world population, food production through traditional agriculture and farming is putting the planet’s resources to the test. Could artificial food ensure adequate nutrition for everyone in the ...
    • Future scenario building and youths' civic insights 

      Ringvold, Tore Andre; Digranes, Ingvild (Peer reviewed; Chapter, 2015)
      This study considers whether future scenario building in design education can serve to increase students’ civic insights regarding sustainable development. A school project, 'Build Your Own Future’, including 7th graders’ work ...
    • A Fuzzy ART2 Model for Finding Association Rules in Medical Data 

      Huang, Yo-Ping; Vu, Thi Thanh Hoa; Jau, Jung-Shian; Sandnes, Frode Eika (Chapter; Peer reviewed, 2010-09)
      This paper describes a model that discovers association rules from a medical database to help doctors treat and diagnose a group of patients who show similar prehistoric medical symptoms. The proposed data mining ...
    • Fuzzy Environment Mapping for Robot Navigation Based on Grid Computing 

      Kao, Li-Jen; Huang, Yo-Ping; Sandnes, Frode Eika; Hsiao, Mann-Jung (Chapter; Peer reviewed, 2010)
      In order to navigate autonomously, a mobile robot needs to build an environment map where the robot is navigating. Currently, the sensors are mounted on the robot to detect if the obstacles exist and then the map immediate ...
    • Game dynamics in design - a process to achieve creative agency (to give people achance) 

      Sjøvoll, Vibeke; Gulden, Tore (Chapter; Peer reviewed, 2017)
      Product designers often take it upon them selves to define environments, problems, and solutions for others. Unfortunately this can serve to arrest the potential engagement for people and block the possibility to act ...
    • Game-Theoretic Learning for Sensor Reliability Evaluation Without Knowledge of the Ground Truth 

      Yazidi, Anis; Hammer, Hugo Lewi; Samouylov, Konstantin; Herrera-Viedma, Enrique (IEEE Transactions on Cybernetics;Date of Publication 06 January 2020, Journal article; Peer reviewed, 2020)
      Sensor fusion has attracted a lot of research attention during the few last years. Recently, a new research direction has emerged dealing with sensor fusion without knowledge of the ground truth. In this article, we present ...
    • Gamified rehabilitation service designed for stroke patient 

      Li, Cong (MAPD;2017, Master thesis, 2017)
    • GANEx: A complete pipeline of training, inference and benchmarking GAN experiments 

      Thambawita, Vajira; Hammer, Hugo Lewi; Riegler, Michael Alexander; Halvorsen, Pål (International Workshop on Content-Based Multimedia Indexing, CBMI;, Conference object, 2019-10-21)
      Deep learning (DL) is one of the standard methods in the field of multimedia research to perform data classification, detection, segmentation and generation. Within DL, generative adversarial networks (GANs) represents a ...
    • Gas Foil Bearing Technology Enhanced with Smart Materials 

      Martowicz, Adam; Roemer, Jakub; KANTOR, Sławomir; Zdziebko, Paweł; Żywica, Grzegorz; Bagiński, Paweł (Applied Sciences;Volume 11 / Issue 6, Peer reviewed; Journal article, 2021-03-19)
      The paper discusses a perspective of the usage of various types of smart materials to enhance the operational properties of Gas Foil Bearings. The authors, referring to the current investigation on thermomechanical ...
    • Gathering of the Hive: Investigating the clustering behaviour of honeybees through art and swarm robotics 

      Roen, Haakon Haraldsen; Varankian, Vako; Nichele, Stefano; Bergaust, Kristin (ALife 2019: Proceedings of the artificial life conference 2019;No 31, July, Conference object, 2019)
      In the Gathering of the Hive project, the societal and ecological implications, as well as technological possibilities of swarm robotics are explored through artistic methodology applied to Artificial Life. These matters ...
    • GAUSSIAN FILTER FOR BRAIN SPECT IMAGING 

      Nikolov, N.A.; Makeev, S.S.; Korostynska, Olga; Novikova, T.G.; Kriukova, Ye.S. (Journal article; Peer reviewed, 2022)
      Abstract Background. The presence of a noise component on 3D images of single-photon emission computed tomo­graphy (SPECT) of a brain significantly distorts the probability distribution function (PD) of the radioactive ...
    • The GDP, the US treasury yield and the federal funds rate: Who follows whom, when and why? 

      Seip, Knut Lehre; Zhang, Dan (Journal of Financial Economic Policy;, Peer reviewed; Journal article, 2021-06-08)
      Purpose: This study addresses the fundamental question on how the major players in the economy dynamically interact with each other: among the central bank, the investors in the bond market, and the firms and consumers ...
    • A General Formalism for Defining and Detecting OpenFlow Rule Anomalies 

      Aryan, Ramtin; Yazidi, Anis; Engelstad, Paal E.; Kure, Øivind (Chapter; Peer reviewed, 2017)
      SDN network's policies are updated dynamically at a high pace. As a result, conflicts between policies are prone to occur. Due to the large number of switches and heterogeneous policies within a typical SDN network, detecting ...
    • General TCP state inference model from passive measurements using machine learning techniques 

      Hagos, Desta Haileselassie; Engelstad, Paal E.; Yazidi, Anis; Kure, Øivind (IEEE Access;VOLUME 6, 2018, Journal article; Peer reviewed, 2018-05-04)
      Many applications in the Internet use the reliable end-to-end Transmission Control Protocol (TCP) as a transport protocol due to practical considerations. There are many different TCP variants widely in use, and each ...
    • Generalizations of the Levi-Civita-Bertotti-Robinson spacetime 

      Grøn, Øyvind; Johannesen, Steinar (The European Physical Journal Plus;129(10), Journal article; Peer reviewed, 2014-10-22)
      The Levi-Civita-Bertotti-Robinson (LBR) solution of Einstein's field equations may be interpreted to describe spacetime in a region without matter outside a charged spherical domain wall. In the present paper we investigate ...
    • Generating realistic eye-tracking data with Transformers 

      Naval Ruiz, Arnau (Master thesis, 2023)
      Eye-gaze forecasting is a field with a significant number of applications, such as User Interface analysis or improving self-driving cars. Despite its importance, this type of data can be hard to come by due to laws ...
    • Generating Synthetic Medical Images with 3D GANs 

      Guttulsrud, Håkon (Master thesis, 2023)
      This thesis presents a novel approach to overcoming the challenges associated with the scarcity of annotated medical image data, a significant hurdle in cancer detection. We propose the use of Generative Adversarial Networks ...
    • Generating synthetic VoIP traffic for analyzing redundant OpenBSD-Firewalls 

      Woernhard, Maurice David (Master thesis, 2006)
      Voice over IP, short VoIP, is among the fastest growing broadband technologies in the private and commercial sector. Compared to the Plain Old Telephone System (POTS), Internet telephony has reduced availability, measured ...
    • Genetic Algorithms For Tightening Security 

      Palumbo, Fabrizio; Buji, Adam; Yazidi, Anis; Haugerud, Hårek (Chapter; Peer reviewed; Conference object, 2022)
      Proper configuration of operating systems and program parameters is known to be a key security factor in order to remove vulnerabilities. It is known that vulnerabilities can be caused by a human misconfiguration or by an ...