Essays about: "Mobile Software Architecture"
Showing result 1 - 5 of 43 essays containing the words Mobile Software Architecture.
-
1. MICRO-ROS FOR MOBILE ROBOTICS SYSTEMS
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : The complexity of mobile robots increases as more parts are added to the system. Introducing microcontrollers into a mobile robot abstracts and modularises the system architecture, creating a demand for seamless microcontroller integration. READ MORE
-
2. The Competitive Conditions for Vendors in the Open RAN Ecosystem : A Study Informed by Expert Interviews
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : Mobile communication technology has become crucial in shaping the way modern society functions. The evolution of cellular networks has created an increasingly interconnected world, supporting various heterogeneous infrastructures. READ MORE
-
3. Performance Assessment of Networked Immersive Media in Mobile Health Applications with Emphasis on Latency
University essay from Blekinge Tekniska HögskolaAbstract : Cloud VR/AR/MR (Virtual Reality, Augmented Reality, and Mixed Reality) services representa high-level architecture that combines large scale computer resources in a data-center structurestyle set up to render VR/AR/MR services using a combination of very high bandwidth, ultralow latency, high throughput, latest 5G (5th Generation) mobile networks to the end users. VR refers to a three-dimensional computer-generated virtual environment made up ofcomputers, which can be explored by people for real time interaction. READ MORE
-
4. Automating the monotonous workflow : Mobile application development and deployment
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : To create, update, or deploy a mobile application, a collection of hand-operated works must be satisfied. In this project, regardless of the mobile application's code and its core functionalities, which can be an e-book, an application, or even a mobile game, we will study how to automate, visualize and simplify the following manual procedures: 1. READ MORE
-
5. Towards attack-tolerant trusted execution environments : Secure remote attestation in the presence of side channels
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing devices to protect security-critical software from run-time attacks and provide isolation from an untrustworthy operating system (OS). A trusted party verifies the software that runs in a TEE using remote attestation procedures. READ MORE