Essays about: "Algoritmer för flera enheter"

Showing result 1 - 5 of 14 essays containing the words Algoritmer för flera enheter.

  1. 1. Outlier Robustness in Server-Assisted Collaborative SLAM : Evaluating Outlier Impact and Improving Robustness

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : José Miguel de Almeida Pedro; [2023]
    Keywords : SLAM; Robust Estimation; Multi-Device Algorithms; SLAM; Robust uppskattning; Algoritmer för flera enheter;

    Abstract : In order to be able to perform many tasks, autonomous devices need to understand their environment and know where they are in this environment. Simultaneous Localisation and Mapping (SLAM) is a solution to this problem. READ MORE

  2. 2. Performance Evaluation of Cryptographic Algorithms on ESP32 with Cryptographic Hardware Acceleration Feature

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Qiao Jin; [2022]
    Keywords : Embedded systems; ESP 32; Cryptographic algorithms; Cryptographic hardware acceleration; AES; RSA; SHA-2; HTTPS; Inbyggda system; ESP 32; Kryptografiska algoritmer; Kryptografisk hårdvaruacceleration; AES; RSA; SHA-2; HTTPS;

    Abstract : The rise of the Internet of Things (IoT) and autonomous robots/vehicles comes with a lot of embedded electronic systems. Small printed circuit boards with microcomputers will be embedded almost everywhere. READ MORE

  3. 3. Analyzing Radial Basis Function Neural Networks for predicting anomalies in Intrusion Detection Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sai Shyamsunder Kamat; [2019]
    Keywords : anomaly; cyber security; evaluation; machine learning; radial basis function; random forest classifier; supervised learning; anomali; cybersäkerhet; utvärdering; maskininlärning; radialbaserad funktion; slumpmässig skogsklassificering; övervakad inlärning;

    Abstract : In the 21st century, information is the new currency. With the omnipresence of devices connected to the internet, humanity can instantly avail any information. However, there are certain are cybercrime groups which steal the information. READ MORE

  4. 4. Combining Influence Maps and Potential Fields for AI Pathfinding

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Filip Pentikäinen; Albin Sahlbom; [2019]
    Keywords : Pathfinding; Real-time performance; Influence map; Potential field; GPGPU; Pathfinding; Realtidsprestanda; Influence map; Potential field; GPGPU;

    Abstract : This thesis explores the combination of influence maps and potential fields in two novel pathfinding algorithms, IM+PF and IM/PF, that allows AI agents to intelligently navigate an environment. The novel algorithms are compared to two established pathfinding algorithms, A* and A*+PF, in the real-time strategy (RTS) game StarCraft 2. READ MORE

  5. 5. WinBro: A Window and Broadcast-based Parallel Streaming Graph Partitioning Framework for Apache Flink

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Adrian Ackva; [2019]
    Keywords : ;

    Abstract : The past years have shown an increasing demand to process data of various kinds and size in real-time. A common representation for many real-world scenarios is a graph, which shows relations between entities, such as users of social networks or pages on the Internet. READ MORE