Essays about: "G phone"

Showing result 11 - 15 of 47 essays containing the words G phone.

  1. 11. Machine learning based call drop healing in 5G

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Janani Ramaswamy Mudaliyar; [2020]
    Keywords : Technology and Engineering;

    Abstract : Self-Organizing Network (SON) functions include self-configuration, dynamic optimization and self-healing of networks. In the era of 5G, mobile operators are increasingly exploring areas of SON through Machine Learning (ML) techniques. READ MORE

  2. 12. A feasibility study on pairinga smartwatch and a mobile devicethrough multi-modal gestures

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Dario Bernardi; [2019]
    Keywords : Mobile devices; Security; Pairing; Signal; Processing; Multimodal Gestures;

    Abstract : Pairing is the process of establishing an association between two personal devices. Although such a process is intuitively very simple, achieving a straightforward and secure association is challenging due to several possible attacks and usability-related issues. READ MORE

  3. 13. An Analysis of Cloud-Based Machine Learning Models for Traffic-Sign Classification

    University essay from Linköpings universitet/Kommunikations- och transportsystem; Linköpings universitet/Tekniska fakulteten

    Author : Victor Lindeman; [2019]
    Keywords : machine learning traffic signcloud;

    Abstract : The machine learning method deep neural networks are commonly used for artificial intelligence applications such as speech recognition, robotics, and computer vision. Deep neural networks often have very good accuracy, the downside is the complexity of the computations. READ MORE

  4. 14. Physical Proximity Verification based on Physical Unclonable Functions

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Marco Spanghero; [2018]
    Keywords : ;

    Abstract : There are rapidly growing concerns about security of hardware implementing cryptographic algorithms. A compromised device can potentially be used as an entry point for cyberattacks on other devices connected to the network, as evidenced by the recent Spectre and Meltdown CPU bugs. READ MORE

  5. 15. Electromagnetic analysis of AES-256 on Xilinx Artix-7

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Oskar Westman; [2018]
    Keywords : Electromagnetic side-channel attack; AES-256; Artix-7; FPGA; Differential analysis; Simple analysis.; Technology and Engineering;

    Abstract : In this project, an electromagnetic side-channel attack has been made by exploiting the information leakage from a field programmable gate array (FPGA) and an implemented advanced encryption standard with a 256-bit key (AES-256). The FPGA-board was a Nexys-4 from Digilent with Artix-7 FPGA. The attack was partially successful. READ MORE