Essays about: "gathering technique"
Showing result 1 - 5 of 43 essays containing the words gathering technique.
-
1. Data streaming provenance in advanced metering infrastructures
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Increasing volumes of data in digital systems have made the traditional approach of gathering and storing all the data while analyzing it in bulks at periodic intervals challenging and costly. One such field is the electric grid market, which has started modernizing its aging grids into smart grids where Advanced Metering Infrastructures (AMIs) play a vital role. READ MORE
-
2. Laser dazzling of CMOS imaging sensors using amplitude modulated and continuous wave lasers
University essay from Umeå universitet/Institutionen för fysikAbstract : Protecting sensitive information is important, especially in defence applications. As cameras become more common, developing countermeasure systems that limit the information gathering capabilities of imaging sensors would be beneficial. READ MORE
-
3. Developing Guidelines for Proactive Supply Chain Risk Management - A Case Study at IKEA Category Food Logistic Services
University essay from Lunds universitet/Teknisk logistikAbstract : The number of supply chain disruptions has increased over the last couple of years. The Covid-19 Pandemic, blockage of the Suez Canal and Russian invasion of Ukraine are some well-known examples of disruptions. READ MORE
-
4. Improving active listening behaviours of embodied conversational agents (ECA) from a UX perspective
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Active listening is a communication technique where the listener listens to the speaker carefully and attentively by confirming or asking for more details about what they heard during a conversation. Active listening has proven to be a very useful technique in learning and extracting insightful information from the conversation and poses many challenges when emulating such behaviours in a virtual character. READ MORE
-
5. Authentication Techniques Based on Physical Layer Attributes
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE