Essays about: "G phone"
Showing result 11 - 15 of 47 essays containing the words G phone.
-
11. Machine learning based call drop healing in 5G
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Self-Organizing Network (SON) functions include self-configuration, dynamic optimization and self-healing of networks. In the era of 5G, mobile operators are increasingly exploring areas of SON through Machine Learning (ML) techniques. READ MORE
-
12. A feasibility study on pairinga smartwatch and a mobile devicethrough multi-modal gestures
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Pairing is the process of establishing an association between two personal devices. Although such a process is intuitively very simple, achieving a straightforward and secure association is challenging due to several possible attacks and usability-related issues. READ MORE
-
13. An Analysis of Cloud-Based Machine Learning Models for Traffic-Sign Classification
University essay from Linköpings universitet/Kommunikations- och transportsystem; Linköpings universitet/Tekniska fakultetenAbstract : The machine learning method deep neural networks are commonly used for artificial intelligence applications such as speech recognition, robotics, and computer vision. Deep neural networks often have very good accuracy, the downside is the complexity of the computations. READ MORE
-
14. Physical Proximity Verification based on Physical Unclonable Functions
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : There are rapidly growing concerns about security of hardware implementing cryptographic algorithms. A compromised device can potentially be used as an entry point for cyberattacks on other devices connected to the network, as evidenced by the recent Spectre and Meltdown CPU bugs. READ MORE
-
15. Electromagnetic analysis of AES-256 on Xilinx Artix-7
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : In this project, an electromagnetic side-channel attack has been made by exploiting the information leakage from a field programmable gate array (FPGA) and an implemented advanced encryption standard with a 256-bit key (AES-256). The FPGA-board was a Nexys-4 from Digilent with Artix-7 FPGA. The attack was partially successful. READ MORE