Essays about: "computer technology"

Showing result 41 - 45 of 2969 essays containing the words computer technology.

  1. 41. Developing a portable, customizable, single-channel EEG device for homecare and validating it against a commercial EEG device

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Máté Károly Tóth; [2023]
    Keywords : Electroencephalography EEG ; Portable EEG; Single-channel EEG; Commercial EEG; Brain-machine interface; Prototype development; Elektroencefalografi EEG ; Bärbar EEG; Enkanaligt EEG; Kommersiellt EEG; Hjärna-maskin-gränssnitt; Prototyputveckling;

    Abstract : There are several commercial electroencephalography (EEG) devices on the market; however, affordable devices are not versatile for diverse research applications. The purpose of this project was to investigate how to develop a low-cost, portable, single-channel EEG system for a research institute that could be used for neurofeedback-related applications in homecare. READ MORE

  2. 42. Streamlining UAV Communication : Investigating and implementing an accessible communication interface between a ground control station and a companion computer

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Johan Gustafsson; Daniel Mogensen; [2023]
    Keywords : UAV; communication protocol; design science; UAV security; software architecture; programming; Mavlink; UAV protocols;

    Abstract : In the future, the usage of UAVs (Unmanned Aerial Vehicles) will be applied in many different areas. Continued research in UAVs can benefit through its applications in disaster response, humanitarian aid, environmental monitoring, infrastructure inspection, improved transportation and delivery systems, and scientific research. READ MORE

  3. 43. Bodies in Smartwatches : Embodied Data and Augmented Experiences in Self-Tracking Runners

    University essay from Linnéuniversitetet/Institutionen för kulturvetenskaper (KV)

    Author : Madelene Logren; [2023]
    Keywords : datafication; human-technology relations; postphenomenology; quantified self; self-tracking; smartwatches;

    Abstract : This thesis investigates the relation between human and smartwatch by exploring the experiences of four Swedish long-distance runners who use digital technology to self-track their running activities. By examining the participating runners’ use of their smartwatches and smartwatch data as postphenomenological human-technology relations (Ihde, 1990), this thesis offers a perspective on the use of wearable self-tracking technology as augmenting human experience through digital data. READ MORE

  4. 44. Parents’ perceptions about preschool children’s use of mobile devices and experiences at art museums

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Sooyoun Kim; [2023]
    Keywords : preschool children; mobile devices; tablets; educational apps; child-computer interaction; art museums; museum learning;

    Abstract : The child–environment interaction type, which involves touching and handling part of collections and displays, is less common in art museums. In addition, art museums demand many behavioural rules from their visitors. The adult caregivers, therefore, prefer that their preschool children participate in child-friendly activity programmes. READ MORE

  5. 45. Implicit Message Integrity Provision : In Heterogeneous Vehicular Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Paul Molloy; [2023]
    Keywords : Privacy; Code Generation; Vehicle-to-infrastructure; Vehicular ad hoc Networks; Standardization; Remote Procedure Calls; Safety; Integritet; Kodgenerering; Fordon-till-infrastruktur; Ad hoc-nät för Fordon; Standardisering; Samtal om fjärrprocedur; Säkerhet;

    Abstract : Vehicles on the road today are complex multi-node computer networks. Security has always been a critical issue in the automotive computing industry. It is becoming even more crucial with the advent of autonomous vehicles and driver assistant technology. There is potential for attackers to control vehicles maliciously. READ MORE