Essays about: "comparative approach"
Showing result 1 - 5 of 866 essays containing the words comparative approach.
-
1. Robust Object Recognition and Tracking with Drones
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The Skara Skyddsängel project explores an innovative method of providing illumination for cyclists along a 20km unlit bike lane using drones. Current GNSS approach performs generally well but further improvements are need for better robustness. Consequently, this thesis project is raised to seek a robust solution in the field of computer vision. READ MORE
-
2. Constructing Capabilities : Military Strategies of Small States in an Age of Transition: Examining the Influence of Strategic Culture
University essay from FörsvarshögskolanAbstract : Scholars tend to approach small states’ military strategies in terms of restraints and opportunities in the external security environment, largely overlooking the influences of a state’s domestic particularities. This thesis aims to explore how the theory of strategic culture, regarded here as an inherent, domestic context in which strategy is formulated, can add nuance to such realist analyses of how small states build and adjust their defence capabilities. READ MORE
-
3. Attack Strategies in Federated Learning for Regression Models : A Comparative Analysis with Classification Models
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Federated Learning (FL) has emerged as a promising approach for decentralized model training across multiple devices, while still preserving data privacy. Previous research has predominantly concentrated on classification tasks in FL settings, leaving a noticeable gap in FL research specifically for regression models. READ MORE
-
4. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE
-
5. An Idea of Land : Hydroelectric Dams lying in the middle of the Sámi of Sweden and Three Affiliated Tribes in the United States.
University essay from Uppsala universitet/Historiska institutionenAbstract : In this study a comparative approach between both the Sámi of northern Sweden and the Three Affiliated Tribes of North Dakota in relation to the constructions of the Letsi Reservoir and Garrison Dams will be given. The comparison will help create an understanding of what kinds of impacts they had to a number of factors. READ MORE