Property:Objective

From its-wiki.no

Jump to: navigation, search

This is a property of type Text.


Pages using the property "Objective"

Showing 25 pages using this property.

(previous 25) (next 25)

-

- no lecture - +josef is "out in town"  +

2

2nd Assignment Presentations H17 +Present your assignments, 20 min each+10min discussion  +
2nd Assignment Presentations H17cont +2nd round of presentations of your assignments, 20 min each+10min discussion  +

5

5G Network Slicing for Free Access to Information +In Mobile Communications, 5G Research is focussing on (a) massive mobile broadband, (b) billions of sensors connected to the network, and (c) ultra-reliable and low-latency networks. A promising technology for addressing these issues is ''network slicing''. This thesis will look into network slicing for free access to information, and thus address the challenges of sustainable development. The free access to information (''InfoInternet'') is answering the needs of digital inclusion, and addresses the needs of 4 billion people currently not using the Internet. InfoInternet means free access to information for all, and addresses directly the SDG goal 9.c of the Agenda 2030. InfoInternet is further the basis ans the catalyst for SDG 3 (health), 4 (education), 5 (gender equality), 8 (decent work), 10 (reduced inequalities), 11 (sustainable cities and communities) and 17 (partnership for the goals). The envisaged Thesis will elaborate on the network slicing for InfoInternet, and evaluates the technological and societal aspects.  +

A

A Semantic Approach for context-aware Authorization in Enterprise Systems +Single-Sign-On (SSO) is one of the dominant sign on mechanisms for the web. Though implementations of SSO are known for quite some year, with implementations from e.g. myopenid.org and Feide, they have only recently reached the mass market. Social networks like LinkedIN, Facebook and Google allow for SSO or rather remote authentication, which is then used for access authorisation of specific tasks on the server of the requiring party. Current Single-Sign-On Systems are only delivering the "yes/no" authentication string back to requiring party. This binary authentication is not state-of-the-art, as it does not provide any information of the role of the person in the remote organisation or the trust-level resulting from the authentication. Advanced access systems include the notation of roles (RBAC) or even attributes (ABAC). Semantic technologies are seen as enablers for context information, which can be add as on of the attributes in an ABAC system. This master thesis consists of research around the topic of authentication methods. We are interested what different kinds of policies that are available to us, third party authentication and what other purposes does the authentication mechanism (e.g. password) have other than pure authentication for common platforms (UNIX, Windows and OSX). The main purpose here is to find the effect of each method/policy that are available to us and henceforth theorize on some best practices. This thesis will establish a model describing the cost-/benefit analysis for a company providing advanced authentication mechanisms, including SSO. A specific focus is on the use of passwords, as they are seen to be critical both with respect to security, but also with respect to usability. The envisaged outcome of the thesis is a policy-based decision tree, allowing companies to define a required security level, and then adopt criteria which will met this required security. Common- and best-praxis examples are foreseen to elaborate on how close industrial solutions are to satisfy the security policy in conjunction with an easy-to-use algorithm.  +
API comparison: Protege, OWL and SPARQL +During this lecture we will continue the discussion of the differences between Protege, OWL, SPARQL (and Jena) APIs. The expected outcome is a comparison between the APIs.  +
Air quality recommender system for commuting +The Norwegian Institute for Air Pollution monitoring has initiated the project CITI-SENSE-MOB on Mobile Air Pollution measurements. Mobile sensor platforms are going to be installed on busses, cars and bicycles to achieve a wider distribution of measurements, as compared to the limited number of fixed stations. The goal of this thesis is to develop a recommender system for air quality while travelling. Travelling to work might happen by foot, bicycle, public transportation or other means. The thesis will address the variability of measured air quality indicators both in time and space, e.g. indicating the variation from major roads to smaller roads or from cycling along major roads towards cycling through green cycling tracks. The mobile data will be combined with sensor data from other sources, e.g. the meteorological office or from the fixed air quality stations in order to establish the model of variability. Predictions of air quality, taking into account correlation of certain measurements and predictions, will then provide an estimated value for air pollution along the way.  +
Analysis and Standards for the Information-Internet +The need for basic information delivery over capacity-limited networks requires new standards for an Information-Internet ('''InfoInternet'''), delivering compressed text and picturesto everyone. The goal of this Master Thesis is to establish and elaborate the standards for the InfoInternet. The Internet links several billion devices worldwide together, and consists of a multitude of networks with local or global scope, private or public connected to a broad array of networking technologies. Today, around 46% of the world’s households have access to Internet through either fixed or mobile subscriptions. However, the gap between developed and developing countries is still wide. According to ITU [2], by the end of 2015, 34% of households in developing countries had Internet access, compared with more than 80% in developed countries. In the least developed countries, only 7% of households have Internet access. In this same set of countries, 12 of 100 inhabitants have active mobile broadband subscriptions, whereas less than 1 of 100 inhabitants have fixed broadband subscriptions. Thus, a large number of inhabitants don't have access to information, not even basic information. The expected outcome of this Master Thesis is a set of elements being the basis for the InfoInternet, and a simulation on how the choice of parameters will influence the size of information being sent to the users' devices. As an example, the size of pictures is a measure of information, but also a criteria for the InfoInternet. One might either restrict to size (e.g. 200 kB), to pixel resolution (e.g. 640 x 480) or to compression modes. Other elements include dynamic styling information.  +
Analysis of Data Structures on the Ethereum Blockchain +The web is becoming increasingly more centralized with data congregating towards big players e.g. Google. This is not the decentralized web Tim Berners-Lee envisioned. Having a couple of companies deciding what is 'truth' and what data is available is undemocratizing. It is also endagering peoples [[privacy]]. Centralized data is more valuable to hackers and to government agencies, with the potential value of a successful hack reaching into the millions. The web can be re-decentralized with the [[blockchain]] technology. Blockchains allow for [[consensus]] in [[peer-to-peer]] networks, removing the need for centralized servers to decide consensus. The blockchain is how [[Bitcoin]] is able to transfer money without a bank as an mediator. Ethereum allows for [[Turing complete]] applications (called [[smart contracts]]) on the blockchain, giving developers the tools needed to move anything to the blockchain. Miners, special nodes reaching consensus on the network, have to run all smart contracts. With the code in these smart contracts being measured in "gas" instead of [[temporal complexity]] and [[spatial complexity]], means that what we know about the efficiency of different data structures, might have to be revisited. Therefor will this thesis compare various data structures on the blockchain in a theoretical and an empirical manner.  +
Analysis of Proxy services for an Information-Internet +The need for basic information delivery over capacity-limited networks requires new standards for an Information-Internet ('''InfoInternet'''), delivering basic information for free to everyone. The Internet links several billion devices worldwide together, and consists of a multitude of networks with local or global scope, private or public connected to a broad array of networking technologies. Today, around 46% of the world’s households have access to Internet through either fixed or mobile subscriptions. However, the gap between developed and developing countries is still wide. According to ITU [2], by the end of 2015, 34% of households in developing countries had Internet access, compared with more than 80% in developed countries. In the least developed countries, only 7% of households have Internet access. In this same set of countries, 12 of 100 inhabitants have active mobile broadband subscriptions, whereas less than 1 of 100 inhabitants have fixed broadband subscriptions. Thus, a large number of inhabitants don't have access to information, not even basic information. The goal of this Master Thesis is to elaborate proxy solutions for converting of Web Content into (compressed) Text and Pictures. The proxy solution used in Opera Mini performs exactly this solution, and can be taken as an example of the work.  +
Ant Colonization Optimisation Algorithm for knowledge-based Learning +This thesis will investigate possibilities for deducing good learning paths to subjects by applying the Ant Colony Optimisation algorithm to a dynamic knowledge graph populated asynchronously by cooperative human learners. Today knowledge about online learning resources are not shared systematically. A framework for collecting and sharing online learning resources will be developed using semantic web technology and used by students at Bergen University College.  +
Antennas and their communication parameters (B2-B3) +Discussion on Antennas and their communication parameters  +
Applying SWRL, DL Query and SPARQL to your ontology +Representing your scenario into a set of rules, and converting the rules to SPARQL queries or SWRL rules  +
Applying protege OWL API +Protege API vs JENA API vs OWL API  +
Assessment of Indoor Positioning System (IPS) technology +Indoor Positioning Systems (IPS) have lead to increased efficiency in may types of organisations and industries, ... An IPS system may consist of only one technology, or be a hybrid of two or more technologies, examples of which being RFID, Wifi, Ultrasound and Ultra-Wideband (UWB). The technology assessment showed that UWB is probably the best technology for use in indoor positioning systems. UWB .... Wifi is a good choice for open indoor environments such as office or class rooms where some level of positioning error is accepted. The testing program build in this thesis, including the proposed positioning methods, show that it is possible to create a low cost indoor positioning system by re-using the existing wireless network infrastructure and still achieve an acceptable level of accuracy  +
Assignment Ideas H17 +Present your ideas for the assignments, 10-15 min each+5min discussion  +
Attribute-based policy specification and enforcement +The main aim is to provide context-aware, dynamic and more efficient policy enforcement.  +

B

Basic Internet +To promote ''Internet light for all'', the free access to Basic Information  +
Basic Internet Feedback to Malta keynote +Understand the basic Internet principles, and the [[InfoInternet]] future standard  +
Basic Internet access +The objective of this project is to provide free information access to everyone. The Internet came to Kjeller and to Europe back in 1973, and 40 years after we have piloted the free access to basic information.  +
Basics of Communication (A1-A3) +The objective of this lecture is to explain the principles of radio communication  +
Basics of Semantics +The objective of this lecture is to explain the principles of Semantic Technologies, including* the elements of semantics* the differences between .rdf, .owl* clarification on expectations towards semantics  +
Bowling +- Eat food - Play Bowling  +
Building an Attack Simulator on the Electric Grid Infrastructure +The future electricity network is based on components, which are state-of-the-art from some years back in time. As an example, the SCADA system consists of network interfaces, browser sessions..., which all can be hacked using standard vulnerabilities. The goal of this thesis is to analyse the vulnerabilities, and build a mobile demonstrator.  +
Building ontologies for UAV +the Ontology structure for * describe the mission * specify the plane * programming/sensor specific aspects  +
(previous 25) (next 25)