Essays about: "Camera analysis"
Showing result 6 - 10 of 337 essays containing the words Camera analysis.
-
6. Deep Learning-Based Depth Estimation Models with Monocular SLAM : Impacts of Pure Rotational Movements on Scale Drift and Robustness
University essay from Linköpings universitet/DatorseendeAbstract : This thesis explores the integration of deep learning-based depth estimation models with the ORB-SLAM3 framework to address challenges in monocular Simultaneous Localization and Mapping (SLAM), particularly focusing on pure rotational movements. The study investigates the viability of using pre-trained generic depth estimation networks, and hybrid combinations of these networks, to replace traditional depth sensors and improve scale accuracy in SLAM systems. READ MORE
-
7. Investigation of Roughness Effects on Heat Transfer of Upscaled Additively Manufactured Channels in the Turbulent Region Using Infrared Thermography
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : Additive manufacturing (AM) has largely improved design freedom compared with traditional manufacturing processes such as casting and milling. The layer-by-layer workflow makes it possible to produce objects with much more complex shapes and structures. READ MORE
-
8. Are Children Safe with Smart Watches? : Security Analysis and Ethical Hacking on Children’s Smart Watches
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : There are more and more parents that are considering to purchase smart watches for their kids. The children’s smart watches on the market are usually equipped with many practical functions like the GPS positioning, the camera and the messaging. READ MORE
-
9. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE
-
10. Performance analysis of the communication system of a drone prototype used for maintenance and cleaning
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Drones in today’s life are used in many sectors to automate various tasks. Delivering small items, capturing live events, and surveying dangerous areas are a few incredible operations of drones in today’s society. It can perform many tasks in human-restricted areas with less service time and cost. READ MORE