Essays about: "embedded"

Showing result 26 - 30 of 2070 essays containing the word embedded.

  1. 26. ANOMALY DETECTION FOR INDUSTRIAL APPLICATIONS USING COMMODITY HARDWARE

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : John Moberg; Jonathan Widén; [2023]
    Keywords : Computer Vision; Anomaly Detection; Single Board Computer; Embedded systems;

    Abstract : As the Automotive industry is heavily regulated from a quality point of view, excellence in pro-duction is obligatory. Due to the fact that removing human error from humans is impossible, new solutions must be found. READ MORE

  2. 27. Hydraulic Modelling of Eurasian Beaver Structural Modifications: Implications for Evaluating their Contributions to Natural Flood Management in Scotland

    University essay from Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet

    Author : Maja Christina Pitcairn; [2023]
    Keywords : Beaver reintroduction; Scotland; Flood risk; Natural flood management; Hydraulic modelling.; Technology and Engineering;

    Abstract : The concurrent climate and biodiversity crises in Scotland necessitate the exploration of ecosystem-based adaptation to simultaneously address increased flood risk and the loss of native species. This research investigated the contributions of Eurasian beaver reintroductions to natural flood management in Scotland. READ MORE

  3. 28. Time-based Key for Coverless Audio Steganography: A Proposed Behavioral Method to Increase Capacity

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : John Alanko Öberg; Carl Svensson; [2023]
    Keywords : Coverless audio steganography; information hiding; covert communication; effective capacity; behavioral; Täcklös ljudsteganografi; informationsdöljning; hemlig kommunikation; effektiv kapacitet; beteendemässig;

    Abstract : Background. Coverless steganography is a relatively unexplored area of steganography where the message is not embedded into a cover media. Instead the message is derived from one or several properties already existing in the carrier media. This renders steganalysis methods used for traditional steganography useless. READ MORE

  4. 29. DISTRIBUTED ARTIFICIAL INTELLIGENCE FOR ANOMALY DETECTION IN A MODULAR MANUFACTURING ENVIRONMENT

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Hana Hodzic; [2023]
    Keywords : ;

    Abstract : This thesis investigates anomaly detection and classification in a simulated modular manufacturingenvironment using Machine Learning algorithm Random Forest. This algorithm is tested on a localcomputer and an embedded device, specifically the Raspberry PI. READ MORE

  5. 30. Erratic Patterns : Unravelling the Cultural Transfers of Library Classifiers

    University essay from Uppsala universitet/Institutionen för ABM

    Author : Keeley Lindkvist; [2023]
    Keywords : Library classifier; library classification; classification; cultural transfer; classification and culture; Library of Congress Classifi-cation Scheme LCC ; knowledge organisation; knowledge organization; The Swedish Institute in Rome ISVRoma ; Biblioteksklassificerare; biblioteksklassificering; kulturell överföring; klassificering och kultur; Library of Congress klassificeringsschema LCC ; kunskapsorganisation; Svenska institutet i Rom ISVRoma ;

    Abstract : This thesis investigates the oft-overlooked influence of the classifier's input during the assignment of library classifications and draws upon cultural transfer theory to shed light on the underlying principles that guide the process. Classifiers' personal knowledge, experience, and beliefs, have a critical role in determining the 'aboutness' of a work and its subsequent classification. READ MORE