Essays about: "constrained device"

Showing result 1 - 5 of 47 essays containing the words constrained device.

  1. 1. ANOMALY DETECTION FOR INDUSTRIAL APPLICATIONS USING COMMODITY HARDWARE

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : John Moberg; Jonathan Widén; [2023]
    Keywords : Computer Vision; Anomaly Detection; Single Board Computer; Embedded systems;

    Abstract : As the Automotive industry is heavily regulated from a quality point of view, excellence in pro-duction is obligatory. Due to the fact that removing human error from humans is impossible, new solutions must be found. READ MORE

  2. 2. Perceptual Sensitivity to Video Degradations in a Simulated Cloud-Gaming Environment: An Empirical Study through Subjective Tests

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Boli Gao; [2023]
    Keywords : ;

    Abstract : Cloud gaming, often referred to as gaming on demand or game streaming, is a contemporary form of online gaming. It operates by running video games on powerful, remote servers and streaming them in realtime directly to a user’s device. READ MORE

  3. 3. Evaluating Thread network performance, locating and strengthening weak radio links

    University essay from Linköpings universitet/Fysik, elektroteknik och matematik; Linköpings universitet/Tekniska fakulteten

    Author : André du Rietz; Elias Salo; [2023]
    Keywords : Internet of Things; IoT; Thread network; Evaluating Thread Network;

    Abstract : In the fast-developing world we are living in, a tech phenomenon known as the Internet of Things (IoT) has taken hold. It has seen a lot of development over the past few decades, and today there are an estimated 30 billion IoT devices active. IoT is a machine-to-machine network that senses the world with the help of sensors. READ MORE

  4. 4. Knowledge distillation for anomaly detection

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Nils Gustav Erik Pettersson; [2023]
    Keywords : ;

    Abstract : The implementation of systems and methodologies for time series anomaly detection holds the potential of providing timely detection of faults and issues in a wide variety of technical systems. Ideally, these systems are able to identify deviations from the normal behavior of systems even before any problems manifest, thus enabling proactive maintenance. READ MORE

  5. 5. Dynamic container orchestration for a device-cloud continuum

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Camilo Alfonso Rodriguez Garzon; [2023]
    Keywords : Edge computing; kubernetes operator; dynamic scheduling; Edge computing; Kubernetes-operatör; dynamisk schemaläggning;

    Abstract : Edge computing has emerged as a paradigm to support the growing demand for real-time processing of data generated at the edge of the network. As the devices at the edge are constrained, one of the challenges in the area is how to schedule workloads. READ MORE