Essays about: "Locking"
Showing result 21 - 25 of 122 essays containing the word Locking.
-
21. FE Modelling Of Two Femur Fixation Implants
University essay from Linköpings universitet/Mekanik och hållfasthetsläraAbstract : In the pool of women over the age of 50, the likeliness of an atypical fracture increase drastically, partly due to osteoporosis. With a pre-existing implant in the femur bone, inserted due to a prior atypical fracture, treating a later femoral neck fracture is complex and risky. READ MORE
-
22. The fragmented smart home : A comprehensive analysis of available interoperable solutions to connect wireless smart home communications
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : The current smart home communication can be viewed as protocol stacks interlocked by their proprietary capsule solutions, locking the consumer into a single market of devices, without integration from other manufacturers. This research heads out to discover frameworks to adapt the heterogenous proprietary communicative offerings within the smart home, to a shared communicative interoperable and centralized controlled home, to enable the end-user to adapt the most efficient device for each scenario without having to consider which wireless communicative protocol or having to install more proprietary solutions to adapt additional technologies, thus neglecting centralized control. READ MORE
-
23. Tipping Markets : An analysis of the Commission's proposal for a Digital Markets Act
University essay from Uppsala universitet/Juridiska institutionenAbstract : The particular characteristics and practices of digital platforms have given rise to the phenomenon of “tipping”, where one platform provider takes the whole market. There has been a growing concern among competition law regulators and enforcers that the traditional ex-post antitrust instruments cannot remedy the distortion of competition it causes in digital markets. READ MORE
-
24. Comparing a gang-like scheduler with the default Kubernetes scheduler in a multi-tenant serverless distributed deep learning training environment
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Systems for running distributed deep learning training on the cloud have recently been developed. An important component of a distributed deep learning job handler is its resource allocation scheduler. This scheduler allocates computing resources to parts of a distributed training architecture. READ MORE
-
25. Investigation on how presentation attack detection can be used to increase security for face recognition as biometric identification : Improvements on traditional locking system
University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologiAbstract : Biometric identification has already been applied to society today, as today’s mobile phones use fingerprints and other methods like iris and the face itself. With growth for technologies like computer vision, the Internet of Things, Artificial Intelligence, The use of face recognition as a biometric identification on ordinary doors has become increasingly common. READ MORE