Essays about: "Mobile Manipulation"
Showing result 1 - 5 of 20 essays containing the words Mobile Manipulation.
-
1. 3D Object Manipulation in Volumetric Video Production
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Remote communication methods have been changing these years and becoming even more important due to the global pandemic. Holographic communication, often represented by volumetric video, is one of the emerging communication methods. Unfortunately, there are few researches on combining 3D objects with volumetric videos. READ MORE
-
2. RISC-V Based Application-Specific Instruction Set Processor for Packet Processing in Mobile Networks
University essay from Linköpings universitet/DatorteknikAbstract : This thesis explores the use of an ASIP for handling O-RAN control data. A model application was constructed, optimized and profiled on a simple RV32-IMC core. The compiled code was analyzed, and the instructions “byte swap”, “pack”, bitwise extract/deposit” and “bit field place” were implemented. READ MORE
-
3. Intuitive programming of mobile manipulation applications : A functional and modular GUI architecture for End-User robot programming
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Mobile manipulators are changing the way companies and industries complete their work. Untrained end users risk facing unfunctional and nonuser- friendly Graphical User Interfaces. READ MORE
-
4. Dark Design Patterns in Coin Master : An In-Depth Game Analysis
University essay from Uppsala universitet/Institutionen för speldesignAbstract : In this study we will investigate the evolution of manipulative and experientially devaluative business practices in the mobile game industry from the perspective of game designers. The focus will be placed on the use of Dark Design Patterns defined in previous research by Zagal et al. READ MORE
-
5. Ethical Hacking of a Robot Vacuum Cleaner
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This study revolves around the safety of IoT devices, more specifically how safe the robot vacuum cleaner Ironpie m6 is. The method is based on threat modeling the device, using the DREAD and STRIDE models. READ MORE