Essays about: "Network Connected Device"

Showing result 1 - 5 of 87 essays containing the words Network Connected Device.

  1. 1. Anomaly Detection for Network Traffic in a Resource Constrained Environment

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Pontus Lidholm; Gaia Ingletto; [2023]
    Keywords : Network Traffic; Anomaly Detection; Embedded Systems; Machine Learning; Random Forest;

    Abstract : Networks connected to the internet are under a constant threat of attacks. To protect against such threats, new techniques utilising already connected hardware have in this thesis been proven to be a viable solution. READ MORE

  2. 2. Simulation and Testing of a MU-MIMO Beamforming System

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Nazyar Mehdishishavan; Zonghan Wang; [2023]
    Keywords : Multi-User Multiple-Input Multiple-Output MU-MIMO ; Beamforming; Sounding Reference Signal SRS ; Reciprocity-based; Butler matrix; Advanced Antenna System AAS ; Technology and Engineering;

    Abstract : Multi-User Multiple-Input Multiple-Output (MU-MIMO) technology has become increasingly important in the field of wireless communication due to its ability to highly increase the capacity and efficiency of wireless networks [1]. Beamforming, as a technique used in MU-MIMO systems, improves network performance by improving signal quality and reducing interference. READ MORE

  3. 3. Aligning the Innovation Process Routines With Organizational Agility : A Case Study of a Healthcare Firm

    University essay from Högskolan i Halmstad/Akademin för företagande, innovation och hållbarhet

    Author : Constantin Catalin Ciorascu; Mohammad Alipanahi; [2023]
    Keywords : Organizational Agility; Innovation Process Routines; Types of Innovations; Healthcare; Medical Device;

    Abstract : Introduction: Traditional organizational routines for the innovation process, like the Stage-Gate Model, are often characterized by rigid and inflexible activities, limiting firms' ability to identify, develop, and commercialize software and digital/connected products and services. Examples of inflexible activities include predefined project milestones, linear progression through development stages, and a lack of iterative feedback loops. READ MORE

  4. 4. Robust visual SLAM with compressed image data : A study of ORB-SLAM3 performance under extreme image compression

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Guangzhi Wang; [2023]
    Keywords : ORB-SLAM3; compression; image feature; localization accuracy; internal parameter; hybrid compressing; brightness enhancement; ORB-SLAM3; kompression; bildfunktion; lokaliseringsnoggrannhet; intern parameter; hybridkomprimering; ljusstyrkeförstärkning;

    Abstract : Offloading SLAM to the edge/cloud is now becoming an attractive option to greatly decrease device energy usage. The new SLAM solution involves compressing image data on the device before transmission, allowing a further decrease in the network bandwidth when performing SLAM at the edge/cloud. READ MORE

  5. 5. Methods for network intrusion detection : Evaluating rule-based methods and machine learning models on the CIC-IDS2017 dataset

    University essay from Uppsala universitet/Institutionen för informatik och media

    Author : Henrik Lindstedt; [2022]
    Keywords : MLP; random forest; CIC-IDS2017; Snort; Intrusion Detection System;

    Abstract : Network intrusion detection is a task aimed to identify malicious network traffic. Malicious networktraffic is generated when a perpetrator attacks a network or internet-connected device with the intent todisrupt, steal or destroy a service or information. READ MORE