Essays about: "File"
Showing result 1 - 5 of 736 essays containing the word File.
-
1. ML implementation for analyzing and estimating product prices
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Efficient price management is crucial for companies with many different products to keep track of, leading to the common practice of price logging. Today, these prices are often adjusted manually, but setting prices manually can be labor-intensive and prone to human error. READ MORE
-
2. Utilizing Hydra for Real-Time Reconstruction of Environments in Extended Reality
University essay from Lunds universitet/Ergonomi och aerosolteknologiAbstract : This thesis explores the use of Hydra for real-time reconstruction of environments in extended reality (XR). The development of the prototype was performed in an iterative manner. Three iterations were executed, each resulting in a prototype with improvements related to the takeaways from the preceding prototype. READ MORE
-
3. Evaluating ChatGPT’s Ability to Compose Music Using the MIDI File Format
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This thesis examines the capabilities of the artificial intelligence model (AI), ChatGPT 3.5-turbo, to compose valuable music in a digital format (MIDI) from natural language prompts. Implementing a multifaceted quantitative approach, the study combines objective musical metrics with subjective user evaluations. READ MORE
-
4. Lateral Control of Heavy Vehicles
University essay from KTH/Väg- och spårfordon samt konceptuell fordonsdesignAbstract : The automotive industry has been involved in making vehicles autonomous to different levels in the past decade rapidly. Particularly in the commercial vehicle market, there is a significant necessity to make trucks have a certain level of automation to help reduce dependence on human efforts to drive. READ MORE
-
5. Profile Based Access Control Model Using JSON Web Tokens
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. READ MORE