Essays about: "Adding Layers"

Showing result 1 - 5 of 52 essays containing the words Adding Layers.

  1. 1. Unveiling the Panoptic Dystopia : Orwell Seen Through Foucault's Lens and Lukes' Dimensions; a Comparative Study

    University essay from Karlstads universitet/Institutionen för språk, litteratur och interkultur (from 2013)

    Author : Martin Andersson; [2024]
    Keywords : : 1984; Animal Farm; George Orwell; Steven Lukes; Foucault; Panopticism; Power structures; Language and power;

    Abstract : This essay focuses on exploring power structures within George Orwell's narratives 1984 andAnimal Farm, through the theoretical lens of Panopticism and the discourse of language andpower. By adding Steven Lukes' multidimensional view of power it digs deep into thecomplexity of power relations and further enriches our understanding of the subject. READ MORE

  2. 2. Heart rate estimation from wrist-PPG signals in activity by deep learning methods

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Marie-Ange Stefanos; [2023]
    Keywords : Deep Learning; Medical Data; Signal Processing; Heart Rate Estimation; Wrist Photoplethysmography; Djup lärning; Medicinska Data; Signalbehandling; Pulsuppskattning; Handledsfotopletysmograf;

    Abstract : In the context of health improving, the measurement of vital parameters such as heart rate (HR) can provide solutions for health monitoring, prevention and screening for certain chronic diseases. Among the different technologies for HR measuring, photoplethysmography (PPG) technique embedded in smart watches is the most commonly used in the field of consumer electronics since it is comfortable and does not require any user intervention. READ MORE

  3. 3. Drone Detection using Deep Learning

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yating Liu; [2023]
    Keywords : Drone Detection; Real-time Tracking; Deep Learning; Computer Vision; Small Object Detection; YOLO; Drönardetektering; Realtidsspårning; Deep Learning; Computer Vision; Small Object Detection; YOLO;

    Abstract : Drone intrusions have been reported more frequently these years as drones become more accessible in the market. The abuse of drones puts threats to public and individual safety and privacy. Traditional anti-drone systems use radio-frequency sensors widely to get the position of drones. READ MORE

  4. 4. Why This Country? : An Empirical Investigation of International Students' Mobility to Sweden

    University essay from Linköpings universitet/Avdelningen för migration, etnicitet och samhälle (REMESO)

    Author : Dennis Darkwa; [2023]
    Keywords : International Students; Miigration; Mobility; Tidö Agreement;

    Abstract : This study offers an in-depth examination of the motives and reflections impacting international students' choice to study in Sweden. Three central themes emerge, namely: motivations for choosing Sweden, cost-benefit evaluations, reflections on immigration prospects, and the impact of Sweden's immigration policy. READ MORE

  5. 5. Role Based Access Control (RBAC) in the context of Smart Grids : Implementing and Evaluating a Role Based Access Control System for Configuration Loading in a Substation from a Desktop

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gatien Ducornaud; [2023]
    Keywords : Role Based Access Control RBAC ; Cybersecurity; Smart Grid; Substation; Desktop Applications; Contrôle d’accès basé sur les rôles RBAC ; Cybersécurité; Réseau électrique intelligent; Sous-Station; Application Desktop; Rollbaserad åtkomstkontroll RBAC ; Cybersäkerhet; Smarta nät; Transformatorstation; datorapplikation;

    Abstract : Access control is a crucial aspect of cybersecurity, and Role Based Access Control (RBAC) is a typical framework for controlling the access to specific resources. However, in the context of Smart Grids, the usual authentication solution of using a trusted identity provider might not be possible to provide authentication of a user, as systems cannot rely on external services. READ MORE