Essays about: "computer based communication"
Showing result 1 - 5 of 224 essays containing the words computer based communication.
-
1. Magic Tree - Development of a technology mediating multi-sensory musical instrument
University essay from Lunds universitet/InnovationAbstract : This thesis is part of the MISK-project, Musik, Interaktiv design, Sinnesstimulering och Kvalitet (Music, Interactive design, Sensory stimulation and Quality). The MISK-project is a collaborative project between Certec at LTH, Furuboda Folkhögskola and Eldorado Resurscenter, developing musical instruments for children and young adults with mental and physical disabilities. READ MORE
-
2. Challenges in Specifying Safety-Critical Systems with AI-Components
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Safety is an important feature in automotive industry. Safety critical system such as Advanced Driver Assistance System (ADAS) and Autonomous Driving (AD) follows certain processes and procedures in order to perform the desired function safely. READ MORE
-
3. Beam Steering Antenna Based on Continuous Transverse Stub Array and Flat Risley Prism Metasurface Lens
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Satellite communication is an integral part of society in this day and era. Due tobandwidth limitations communication frequencies have moved into higher frequencybandwidths. With the advancements in communication comes the demand for more efficientantennas due to the high attenuation of millimeter wavelength frequencies. READ MORE
-
4. Approaches and Techniques to Assess the Accuracy of Network Emulators
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : As the mobile communication world expands in size and complexity, the need for testing the solutions in a controlled environment before deployment is as pronounced as ever. Simultaneously, new tools and products are developed to optimize the process and reduce costs. READ MORE
-
5. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE