Essays about: "COMPUTER USE FOR ENGINEERING"

Showing result 1 - 5 of 235 essays containing the words COMPUTER USE FOR ENGINEERING.

  1. 1. Modelling Micropollutant Removal Through Ozonation in Wastewater

    University essay from Lunds universitet/Kemiteknik (CI)

    Author : Maximiliano Andrés Oportus Foster; [2023]
    Keywords : Micropollutants; water reuse; wastewater treatment models; ozonation; computer modeling; water and environmental engineering; Technology and Engineering;

    Abstract : Proper management of water resources is a key to climate change adaptation and resilience in modern societies. Adequate treatment of wastewater is essential for ensuring the sustainability of the water cycle and the health of the environment and the ecosystems that inhabit it. READ MORE

  2. 2. Assessing the Efficiency of COLMAP, DROID-SLAM, and NeRF-SLAM in 3D Road Scene Reconstruction

    University essay from Lunds universitet/Matematik LTH

    Author : Marcus Ascard; Farjam Movahedi; [2023]
    Keywords : 3D reconstruction; Visual SLAM; Pose evaluation; Point cloud evaluation; Road scenes; Technology and Engineering;

    Abstract : 3D reconstruction is a field in computer vision which has evolved rapidly as a result of the recent advancements in deep learning. As 3D reconstruction pipelines now can run in real-time, this has opened up new possibilities for teams developing Advanced Driver Assistance Systems (ADAS), which rely on the camera system of the vehicle to enhance the safety and driving experience. READ MORE

  3. 3. Prototyping Tool for Large Scale Interactive Experiences

    University essay from Lunds universitet/Institutionen för designvetenskaper

    Author : Venkata Satya Anurag Gargeya Unnava; Yiyang Liu; [2023]
    Keywords : Virtual Reality; Augmented Reality; Interactive Content; Large Scale Interactive Content; Visualizer; Simulations; Technology and Engineering;

    Abstract : In the age where entertainment is the driving force behind the functioning of large industries, companies like SONY have figured out a way to market their entertainment content including movies, music, and games using large-scale interactive marketing and promotional content. Building and testing such content before it is released on large and complex devices is a continuously challenging task and there have been efforts both in academia and industry made to ameliorate this content production workflow. READ MORE

  4. 4. Navigating through Frustrations : A User-Centered Approach to Enhancing Airborne Early Warning and Control System Operator Experience

    University essay from Uppsala universitet/Institutionen för informatik och media

    Author : Josef Jönsson; [2023]
    Keywords : Human-computer interaction; Military; User interface design; Usability; User-centered Design; Airborne Early Warning and Control System; User experience; Research-through-design; Defense industry; High-stakes environments;

    Abstract : This master thesis focuses on enhancing the user interface experience for Airborne Early Warning and Control (AEW&C) system operators in a military context. Collaborating with Saab, a defense sector company, the study employs the research through design and a user-centered design approach to investigate user needs and how they interact with the interface. READ MORE

  5. 5. How to Educate an Organization in Working with Security Topics from a User Experience Perspective

    University essay from Lunds universitet/Ergonomi och aerosolteknologi; Lunds universitet/Certec - Rehabiliteringsteknik och Design

    Author : Felicia Gabrielii Augustsson; Anna Dahlström; [2023]
    Keywords : User centered design; threat analysis; security; experiential learning; gamification; interactive learning tool; the design process; Technology and Engineering;

    Abstract : In today's rapidly evolving society, the pervasive influence of technology has profoundly transformed various aspects of human life, presenting both unprecedented opportunities and critical security challenges. To mitigate the risks of data breaches, malicious attacks, and overall cyber threats, companies have taken proactive measures by providing education and training to their employees in the areas of cyber security and software security. READ MORE