Essays about: "computing and information system thesis"

Showing result 1 - 5 of 114 essays containing the words computing and information system thesis.

  1. 1. Multiple-Emitter Super-resolution Imaging using the Alternating Descent Conditional Gradient Method

    University essay from Lunds universitet/Beräkningsbiologi och biologisk fysik - Genomgår omorganisation; Lunds universitet/Institutionen för astronomi och teoretisk fysik - Genomgår omorganisation

    Author : Dolev Illouz; [2023]
    Keywords : super-resolution; alternating descent conditional gradient method; ADCG; multiple-emitter localization; nanoscale imaging; single molecule tracking; Physics and Astronomy;

    Abstract : This thesis examines the state-of-the-art 2D super-resolution technique alternating descent conditional gradient (ADCG) method's ability to accurately localize fluorophores in diffraction-limited single molecule images (SMI) and analyze the impact of pre-processing and post-processing modules on ADCG's fluorophore localization. A synthetic dataset obtained from the 2013 Grand Challenge localization microscopy and a temporally linked dataset obtained from an unpublished set of Optical DNA mapping experiments performed by Jonathan Jeffet at the NanoBioPhotonix Lab at Tel-Aviv University were initially segmented to extract their noise parameters. READ MORE

  2. 2. Real-time visual feedback of emotional expression in singing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xuehua Fu; [2023]
    Keywords : Sound and Music Computing; Music Visualization; Cross-modal Feedback; Mapping; Music Expressivity; Multimodal Interaction; Ljud-och musikberäkning; Musikvisualisering; Korsmodal återkoppling; Kartläggning; Musikexpressivitet; Multimodal interaktion;

    Abstract : The thesis project concerns the development and evaluation of a real-time music visualization system aimed at creating a multi-modal perceptual experience of music emotions. The purpose of the project is to provide singers with real-time visual feedback on their singing, to enhance their expression of emotions in the music. READ MORE

  3. 3. Cloud Computing Pricing and Deployment Efforts : Navigating Cloud Computing Pricing and Deployment Efforts: Exploring the Public-Private Landscape

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Casper Kristiansson; Fredrik Lundström; [2023]
    Keywords : Cloud computing; Private cloud; Public cloud; Cloud computing services; Cost-effectiveness; Implementation effort; Google GCP; Microsoft Azure; Amazon AWS; Pricing models; Cloud adoption; Cloud cost management; Cloud migration; Instance computing; Serverless computing; Data storage; Molntjänster; Privat moln; Offentligt moln; Kostnadsjämförelse; Kostnadseffektivitet; Google GCP; Microsoft Azure; Amazon AWS; Molninförande; Molnkostnadshantering; Molnmigration; Instance computing; Serverless computing; Dataförvaring;

    Abstract : The expanding adoption of cloud computing services by businesses has transformed IT infrastructure and data management in the computing space. Cloud computing offers advantages such as availability, scalability, and cost-effectiveness, making it a favored choice for businesses of all sizes. READ MORE

  4. 4. A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Faith Nnenna Onwumere; [2023]
    Keywords : IoT; ABE; Attribute-based Encryption; CP-ABE; KP-ABE; Internet of Things; Cryptography; Smart Devices;

    Abstract : Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. READ MORE

  5. 5. HackerGraph : Creating a knowledge graph for security assessment of AWS systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexios Stournaras; [2023]
    Keywords : Cloud security; Knowledge graph; Attack graph; Vulnerability ssessment; Attack paths; Vulnerable-by-design systems; Cloudgoat; Molnsäkerhet; Kunskapsgraf; Attackgraf; Sårbarhetsanalysis; Sårbara miljöer; Cloudgoat;

    Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE