Essays about: "End- User Data Control"

Showing result 1 - 5 of 50 essays containing the words End- User Data Control.

  1. 1. THE IMPACT OF DYNAMIC GAME DIFFICULTY BALANCING ON PLAYER USER EXPERIENCE IN PUZZLE GAMES : A case study

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Qian Lin; [2023]
    Keywords : dynamic game difficulty balancing; game user experience; flow; puzzle games; Eureka effect; a-ha moment; engagement; immersion;

    Abstract : This study delves into the relationship between Dynamic Game Difficulty Balance and Game User Experience in the context of puzzle games. The aim of this study was to explore the impact of DGDB on user experience in puzzle games, focusing on player engagement, immersion, and the occurrence of a-ha moment. READ MORE

  2. 2. Ray-tracing Based Investigations on the Deployment of RISs in Indoor Scenarios

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Swaroop Divya Sai Prem Nambala; Dexin Kong; [2023]
    Keywords : Reconfigurable intelligent surface; RIS; optimization; Ray-tracing; Mixed integer linear programming MILP ; Complex impulse response; Wireless Insite.; Technology and Engineering;

    Abstract : Reconfigurable intelligence surface (RIS) is a promising candidate technology for future 6G wireless communication systems. In existing communication systems, the network operators are unable to control the propagation environment, which causes significant limitations on communication performance. READ MORE

  3. 3. Prediction of 5G system latency contribution for 5GC network functions

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ziyu Cheng; [2023]
    Keywords : Network model; End-to-end delay; 5GC; Prediction model; CPU load; Nätverksmodell; Slutanvändare; latens; 5GC; Modell för prediktering; CPU-last;

    Abstract : End-to-end delay measurement is deemed crucial for network models at all times as it acts as a pivotal metric of the model’s effectiveness, assists in delineating its performance ceiling, and stimulates further refinement and enhancement. This premise holds true for 5G Core Network (5GC) models as well. READ MORE

  4. 4. Understanding the Impact of Cloud-Based Shadow IT on Employee and IT-Manager Perceptions in the Swedish Tech Industry

    University essay from Linköpings universitet/Informationssystem och digitalisering; Linköpings universitet/Filosofiska fakulteten

    Author : Adam Fager; [2023]
    Keywords : Cloud-Based Shadow IT; Shadow IT; Swedish Tech Sector; Data Privacy; Managers; Employees; End User Computation; Workaround; Personal IT; Third-Party Access;

    Abstract : This study focuses on the impact of Cloud-Based Shadow IT on data privacy in the tech sector of Sweden. It explores the use of unapproved applications by employees without the knowledge and control of the IT department. READ MORE

  5. 5. IMPERATIVE MODELS TO DECLARATIVE CONSTRAINTS : Generating Control-Flow Constraints from Business Process Models

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Arvid Bergman Thörn; [2023]
    Keywords : Business Process Management; Imperative modelling; Declarative constraints; Conformance checking; Process querying; Process Mining;

    Abstract : In complex information systems, it is often crucial to evaluate whether a sequence of activities obtained from a system log complies with behavioural rules. This process of evaluation is called conformance checking, and the most classical approach to specifying the behavioural rules is in the form of flow chartlike process diagrams, e.g. READ MORE