Essays about: "Datorer i skolan"
Showing result 1 - 5 of 102 essays containing the words Datorer i skolan.
-
1. Benchmarking the request throughput of conventional API calls and gRPC : A Comparative Study of REST and gRPC
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As the demand for better and faster applications increase every year, so does the demand for new communication systems between computers. Today, a common method for computers and software systems to exchange information is the use of REST APIs, but there are cases where more efficient solutions are needed. In such cases, RPC can provide a solution. READ MORE
-
2. Regression with Bayesian Confidence Propagating Neural Networks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Bayesian Confidence Propagating Neural Networks (BCPNNs) are biologically inspired artificial neural networks. These networks have been modeled to account for brain-like aspects such as modular architecture, divisive normalization, sparse connectivity, and Hebbian learning. READ MORE
-
3. Evaluating the use of clock frequency ratio estimators in the playout from video distribution networks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As traditional TV-broadcasters utilize the Internet to transport video streams, they often employ third party distribution networks to ensure that the Quality of Service of the packet stream remain high. In the last step of such a distribution network, a playout scheduler will schedule the packets so that their intervals are as close as possible to the intervals with which they were initially sent by the source. READ MORE
-
4. LSTM-attack on polyalphabetic cyphers with known plaintext : Case study on the Hagelin C-38 and Siemens and Halske T52
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Polyalphabetic cyphers have been used for centuries and well into the 1970s to transmit all kinds of messages. Since then, computers and modern cryptography have taken over making bruteforce attacks unfeasible when designed properly. READ MORE
-
5. Introducing disturbances to a chopped PIR sensor when investigating the performance in an office environment
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : This master's thesis, conducted in collaboration with Knowit Connectivity, aims to develop a booking device for meeting rooms. The focus of the project is to identify and mitigate disturbances in the C-PIR sensor introduced by Haili Liu et al. READ MORE