Essays about: "control devices"
Showing result 1 - 5 of 648 essays containing the words control devices.
-
1. Control system and simplified timesynchronization for heterogenous IoT systems with medium time requirements
University essay from KTH/Hälsoinformatik och logistikAbstract : The company QTPIE conducts research on drivers and their unconscious reactions when driving. To help, they use smart devices that today must be individually handled at the start and end of a run, and have individually set timestamps, which can lead to differences between the units when data is entered and collation of the units' data after a run. READ MORE
-
2. The Cost of Convenience: An Exploration of the Privacy Aspects in Period-Tracking Applications : A mixed-method study of perceived privacy by users in period-tracking applications
University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)Abstract : The increasing demand for female-centred services and devices in the digital era has challenged traditional notions of privacy. This thesis explores how users perceive privacy issues in period- tracking applications provided by various developers. READ MORE
-
3. Towards Adaptive Image Resolution for Visual SLAM on Resource-constrained Devices
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Today, a large number of devices with small form factors and limited resources are being integrated with processes to perform complex tasks such as localization and mapping. One example of this are headsets used for Extended Reality. READ MORE
-
4. Wi-Fi fingerprinting as a mean to measure building occupancy : A case study in an office environment
University essay from KTH/TransportplaneringAbstract : The task of collecting visitor data in an indoor environment and therein determining the occupancy of a building is an extensive task. Conventional methods are expensive, time-consuming, and often lack the ability to produce data in longer time series. Further, they often require disruption of the studied area as equipment must be deployed. READ MORE
-
5. Profile Based Access Control Model Using JSON Web Tokens
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. READ MORE