Essays about: "constrained device"
Showing result 1 - 5 of 47 essays containing the words constrained device.
-
1. ANOMALY DETECTION FOR INDUSTRIAL APPLICATIONS USING COMMODITY HARDWARE
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : As the Automotive industry is heavily regulated from a quality point of view, excellence in pro-duction is obligatory. Due to the fact that removing human error from humans is impossible, new solutions must be found. READ MORE
-
2. Perceptual Sensitivity to Video Degradations in a Simulated Cloud-Gaming Environment: An Empirical Study through Subjective Tests
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Cloud gaming, often referred to as gaming on demand or game streaming, is a contemporary form of online gaming. It operates by running video games on powerful, remote servers and streaming them in realtime directly to a user’s device. READ MORE
-
3. Evaluating Thread network performance, locating and strengthening weak radio links
University essay from Linköpings universitet/Fysik, elektroteknik och matematik; Linköpings universitet/Tekniska fakultetenAbstract : In the fast-developing world we are living in, a tech phenomenon known as the Internet of Things (IoT) has taken hold. It has seen a lot of development over the past few decades, and today there are an estimated 30 billion IoT devices active. IoT is a machine-to-machine network that senses the world with the help of sensors. READ MORE
-
4. Knowledge distillation for anomaly detection
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The implementation of systems and methodologies for time series anomaly detection holds the potential of providing timely detection of faults and issues in a wide variety of technical systems. Ideally, these systems are able to identify deviations from the normal behavior of systems even before any problems manifest, thus enabling proactive maintenance. READ MORE
-
5. Dynamic container orchestration for a device-cloud continuum
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Edge computing has emerged as a paradigm to support the growing demand for real-time processing of data generated at the edge of the network. As the devices at the edge are constrained, one of the challenges in the area is how to schedule workloads. READ MORE