Essays about: "Conclusion of computer system"

Showing result 1 - 5 of 107 essays containing the words Conclusion of computer system.

  1. 1. Interaction Design for Remote Control of Military Unmanned Ground Vehicles

    University essay from Linköpings universitet/Interaktiva och kognitiva system

    Author : Diana Saleh; [2021]
    Keywords : Human Robot Interaction HRI ; Design; Unmanned Ground Vehicles UGV ; Autonomous Systems; Human Computer Interaction HCI ; Information Systems; Interaction Design; User Experience UX ; Unmanned Vehicles UV ; Autonomous Vehicles; Interactive Systems; User Interface UI ; Research Through Design; Military; Teleoperation; Swedish Armed Forces;

    Abstract : The fast technology development for military unmanned ground vehicles (UGVs) has led to a considerable demand to explore the soldier’s role in an interactive UGV system. This thesis explores how to design interactive systems for UGVs for infantry soldiers in the Swedish Armed Force. READ MORE

  2. 2. The Kiruna town move : Unearthing the possibilities for full-scale fire tests

    University essay from Luleå tekniska universitet/Byggkonstruktion och brand; Luleå tekniska universitet/Byggkonstruktion och brand

    Author : Henrik Pettersson; Adam Thörn; [2021]
    Keywords : Full-scale fire tests; Kiruna town move; SFPE roadmap; Fire tests; Kiruna s housing-stock; Fullskaliga brandförsök; Kiruna stadsflytt; Brandförsök; Kirunas Byggnadsbestånd;

    Abstract : The work with this thesis started during the last semester at the Fire Protection Engineering program at Luleå University of Technology. Kiruna has relied on the iron ore resources of Luossavaara and Kiirunavaara since the creation of the town. The iron ore stretches underneath the current city center. READ MORE

  3. 3. Understanding the MicroScope Microarchitectural Replay Attack Through a New Implementation

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Clara Tillman; [2021]
    Keywords : ;

    Abstract : Side-channel attacks, where information is extracted through analysis of the implementation of a computer system by a malicious adversary, constitute security vulnerabilities that may be hard to mitigate. They however suffer from noise originating from, for example, other processes or frequent cache evictions, which forces an attacker to repeat the attack a large number of times in order to obtain useful information. READ MORE

  4. 4. Edge Machine Learning for Wildlife Conservation : Detection of Poachers Using Camera Traps

    University essay from Linköpings universitet/Reglerteknik

    Author : Pontus Arnesson; Johan Forslund; [2021]
    Keywords : deep learning; ai; human detection; microcontroller; edge devices; camera trap; esp32;

    Abstract : This thesis presents how deep learning can be utilized for detecting humans ina wildlife setting using image classification. Two different solutions have beenimplemented where both of them use a camera-equipped microprocessor to cap-ture the images. READ MORE

  5. 5. Development of a computer vision based real-time feedback system for closed-loop control in 3D concrete printing

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Julian Kaduk; [2021]
    Keywords : ;

    Abstract : With 3D concrete printing (3DCP) starting to go beyond small scale novelty projects and the aim to disrupt the construction industry, more development is needed to overcome remaining challenges and improve the processes. Quality assurance and control can be important concerns to gain the confidence of early adopters. READ MORE