Essays about: "Device Features"

Showing result 1 - 5 of 213 essays containing the words Device Features.

  1. 1. Optical Communication using Nanowires and Molecular Memory Systems

    University essay from Lunds universitet/Fysiska institutionen; Lunds universitet/Synkrotronljusfysik

    Author : Thomas Kjellberg Jensen; [2024]
    Keywords : neuromorphic computing; nanowire; molecular dye; DASA photoswitch; OBIC; Physics and Astronomy;

    Abstract : Neuromorphic computational networks, inspired by biological neural networks, provide a possible way of lowering computational energy cost, while at the same time allowing for much more sophisticated devices capable of real-time inferences and learning. Since simulating artificial neural networks on conventional computers is particularly inefficient, the development of neuromorphic devices is strongly motivated as the reliance on AI-models increases. READ MORE

  2. 2. Using Synthetic Data For Object Detection on the edge in Hazardous Environments

    University essay from Lunds universitet/Institutionen för reglerteknik

    Author : Faraz Azarnoush; Damil Sabotic; [2024]
    Keywords : Technology and Engineering;

    Abstract : This thesis aims to evaluate which aspects are important when generating synthetic data with the purpose of running on a lightweight object detection model on an edge device. The task we constructed was to detect Canisters and whether they feature a protective valve called a Cap or not (called a No-Cap). READ MORE

  3. 3. Profile Based Access Control Model Using JSON Web Tokens

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Mustafa Albayati; Aslan Murjan; [2023]
    Keywords : access control; profiles; IoT; device; OpenIDC; Technology and Engineering;

    Abstract : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. READ MORE

  4. 4. Anomaly Detection for Network Traffic in a Resource Constrained Environment

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Pontus Lidholm; Gaia Ingletto; [2023]
    Keywords : Network Traffic; Anomaly Detection; Embedded Systems; Machine Learning; Random Forest;

    Abstract : Networks connected to the internet are under a constant threat of attacks. To protect against such threats, new techniques utilising already connected hardware have in this thesis been proven to be a viable solution. READ MORE

  5. 5. Detection and Tracking of Elephants using Seismic Direction of Arrival Estimates

    University essay from Linköpings universitet/Reglerteknik

    Author : Albin Westlund; Daniel Goderik; [2023]
    Keywords : Wildlife Conservation; DOA Estimation; Geophone Array; Target Tracking; Elephant Detection;

    Abstract : As human settlement expands into the natural habitats of wild animals, the conflict between humans and wildlife increases. The human-elephant conflict is one that causes a tremendous amount of damage, often to poor villages close to the savannah. READ MORE