Essays about: "gathering technique"

Showing result 1 - 5 of 43 essays containing the words gathering technique.

  1. 1. Data streaming provenance in advanced metering infrastructures

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Zozk Mohamed; [2023-11-24]
    Keywords : Advanced Metering Infrastructure; Ananke; Apache Flink; Göteborg Energi; Provenance; Stream processing; Stream Processing Engine;

    Abstract : Increasing volumes of data in digital systems have made the traditional approach of gathering and storing all the data while analyzing it in bulks at periodic intervals challenging and costly. One such field is the electric grid market, which has started modernizing its aging grids into smart grids where Advanced Metering Infrastructures (AMIs) play a vital role. READ MORE

  2. 2. Laser dazzling of CMOS imaging sensors using amplitude modulated and continuous wave lasers

    University essay from Umeå universitet/Institutionen för fysik

    Author : Johan Fjellström; [2023]
    Keywords : ;

    Abstract : Protecting sensitive information is important, especially in defence applications. As cameras become more common, developing countermeasure systems that limit the information gathering capabilities of imaging sensors would be beneficial. READ MORE

  3. 3. Developing Guidelines for Proactive Supply Chain Risk Management - A Case Study at IKEA Category Food Logistic Services

    University essay from Lunds universitet/Teknisk logistik

    Author : Isabella Dahlheim; Anna Myhrman; [2023]
    Keywords : Supply Chain Risk Management SCRM ; Proactive SCRM; Risk Management Maturity; Risk Culture; Learnings Lessons Learned ; Multiple Case Study; Design Science Research Approach; Technology and Engineering;

    Abstract : The number of supply chain disruptions has increased over the last couple of years. The Covid-19 Pandemic, blockage of the Suez Canal and Russian invasion of Ukraine are some well-known examples of disruptions. READ MORE

  4. 4. Improving active listening behaviours of embodied conversational agents (ECA) from a UX perspective

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Bharat Narayanan; [2022]
    Keywords : Embodied Conversational Avatar; Virtual Humans; User Experience; Active Listening Behaviour; Characteristics; Expressions.;

    Abstract : Active listening is a communication technique where the listener listens to the speaker carefully and attentively by confirming or asking for more details about what they heard during a conversation. Active listening has proven to be a very useful technique in learning and extracting insightful information from the conversation and poses many challenges when emulating such behaviours in a virtual character. READ MORE

  5. 5. Authentication Techniques Based on Physical Layer Attributes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xintai Liang; [2022]
    Keywords : Wireless security; Spoofing attacks; Physical layer authentication; Channel State Information; Machine learning; Trådlös säkerhet; Spoofing attack; Autentisering av fysiska lager; Kanaltill Stånds Information; Maskinin lärning;

    Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE