Essays about: "Blekinge institute of technology"
Showing result 1 - 5 of 113 essays containing the words Blekinge institute of technology.
-
1. Evaluating the Realism of Aspen Trees Generated by an Interactive Script-based Tool
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. The most common method of generating realistic trees is by using a non-interactive and fully automatic algorithm, however, an interactive method can create realistic results as well. READ MORE
-
2. Evaluating the Usability of an Interactive Bridge Generator : Procedural Content Generation in Unreal Engine 4
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. Development time and costs of video games are constantly rising andtools using Procedural Content Generation exist with the purpose of making thedevelopment process smoother.Objectives. This thesis’ aim is to evaluate the usability of an interactive bridgegenerator that uses Procedural Content Generation. READ MORE
-
3. Review of Earlier Thesis work at BTH Related to Packaging and Packaging Field
University essay from Blekinge Tekniska Högskola/Institutionen för maskinteknikAbstract : This work aims at giving a systematic review of the numerical approaches and obtained results published in recent years. Focus is set on both the recent trends and achievements as well as challenges and open questions. READ MORE
-
4. Creating a streamlinedmanual fluorescent stainingmethod for neuroscience
University essay from Blekinge Tekniska Högskola/Institutionen för maskinteknikAbstract : This thesis will conduct an attempt of simplifying the currently used stainingmethod of the protein profiling group at The Karolinska Institute led by Jan Mulder. By utilizing iterative product development several prototypes were created to first fit the criteria’s specified and secondly best retain and evenly spread a solution across the tissue sections. READ MORE
-
5. The Performance of Post-Quantum Key Encapsulation Mechanisms : A Study on Consumer, Cloud and Mainframe Hardware
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. People use the Internet for communication, work, online banking and more. Public-key cryptography enables this use to be secure by providing confidentiality and trust online. Though these algorithms may be secure from attacks from classical computers, future quantum computers may break them using Shor’s algorithm. READ MORE