Essays about: "Mobile Software Architecture"

Showing result 1 - 5 of 43 essays containing the words Mobile Software Architecture.

  1. 1. MICRO-ROS FOR MOBILE ROBOTICS SYSTEMS

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Peter Nguyen; [2022]
    Keywords : ROS; microcontrollers; tracing; mobile robotics; analysis;

    Abstract : The complexity of mobile robots increases as more parts are added to the system. Introducing microcontrollers into a mobile robot abstracts and modularises the system architecture, creating a demand for seamless microcontroller integration. READ MORE

  2. 2. The Competitive Conditions for Vendors in the Open RAN Ecosystem : A Study Informed by Expert Interviews

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Daniel Peng; [2022]
    Keywords : Open Radio Access Network; 5G; Competitive conditions; RAN vendors; enterprise solutions; Öppna radioåtkomstnätverk; 5G; Konkurrensvillkor; RAN leverantörer; företagslösningar;

    Abstract : Mobile communication technology has become crucial in shaping the way modern society functions. The evolution of cellular networks has created an increasingly interconnected world, supporting various heterogeneous infrastructures. READ MORE

  3. 3. Performance Assessment of Networked Immersive Media in Mobile Health Applications with Emphasis on Latency

    University essay from Blekinge Tekniska Högskola

    Author : Emmanuel Adebayo; [2021]
    Keywords : Performance Assessment; Networked Immersive Media; Cloud Virtual Reality; Cloud Network; Edge Network.;

    Abstract : Cloud VR/AR/MR (Virtual Reality, Augmented Reality, and Mixed Reality) services representa high-level architecture that combines large scale computer resources in a data-center structurestyle set up to render VR/AR/MR services using a combination of very high bandwidth, ultralow latency, high throughput, latest 5G (5th Generation) mobile networks to the end users.  VR refers to a three-dimensional computer-generated virtual environment made up ofcomputers, which can be explored by people for real time interaction. READ MORE

  4. 4. Automating the monotonous workflow : Mobile application development and deployment

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Ahmadreza Vakilalroayayi; [2021]
    Keywords : Design science; Design science research process; Process model; Continuous integration; Continuous delivery; Software architecture; Automating workflow; Image processing; Perform Git commands automatically; Deploy mobile applications automatically; Designvetenskap; Designvetenskaplig forskningsprocess; Processmodell; Kontinuerlig integration; Kontinuerlig leverans; Programvaruarkitektur; Automatisera arbetsflöde; Automatisk bildbehandling; Utför Git -kommandon automatiskt; Distribuera mobilapplikationer automatiskt;

    Abstract : To create, update, or deploy a mobile application, a collection of hand-operated works must be satisfied. In this project, regardless of the mobile application's code and its core functionalities, which can be an e-book, an application, or even a mobile game, we will study how to automate, visualize and simplify the following manual procedures: 1. READ MORE

  5. 5. Towards attack-tolerant trusted execution environments : Secure remote attestation in the presence of side channels

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Max Crone; [2021]
    Keywords : trusted execution environment; remote attestation; sel4; microkernel; arm trustzone; intel sgx; side-channels; transient execution attacks; trusted execution environment; remote attestation; sel4; microkernel; arm trustzone; intel sgx; side-channels; transient execution attacks;

    Abstract : In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing devices to protect security-critical software from run-time attacks and provide isolation from an untrustworthy operating system (OS). A trusted party verifies the software that runs in a TEE using remote attestation procedures. READ MORE