Essays about: "hardware in information technology"
Showing result 1 - 5 of 349 essays containing the words hardware in information technology.
-
1. Implementations and evaluation of machine learning algorithms on a microcontroller unit for myoelectric prosthesis control
University essay from Lunds universitet/Avdelningen för Biomedicinsk teknikAbstract : Using a microcontroller unit to implement different machine learning algorithms for myoelectric prosthesis control is currently feasible. Still there are hardware and timing constraints that need to be accounted for. READ MORE
-
2. Hardware Subsystem Proposal of an Off-Vehicle Battery Analyzer from a Charging/Discharging Perspective
University essay from Högskolan Väst/Institutionen för ingenjörsvetenskapAbstract : Electric Vehicles (EVs) are seen as one of the solutions to some of the world’s global current problems, such as global warming and air pollution, due to non-existent operational emissions and increased efficiency. There are multiple types of EVs, one of them being Battery Electric Vehicles (BEVs) which in most cases utilizes a Li-Ion battery pack as energy storage. READ MORE
-
3. Real-time Autofocus Algorithm in Laser Speckle Contrast Imaging
University essay from KTH/Skolan för kemi, bioteknologi och hälsa (CBH)Abstract : Microcirculation is defined as the blood flow in the smallest blood vessels. Laser speckle contrast imaging (LSCI) is a full field imaging technique that provides instantaneous 2-D perfusion maps of illuminated tissues based on speckle contrast. READ MORE
-
4. Digital Front End Algorithms for Sub-Band Full Duplex
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Sub-band full duplex is a new communication scheme technology, where a single frequency band is partitioned into sub-bands for downlink (DL) and up-link(UL) transmissions, and both can take place simultaneously. The idea behind the sub-band full duplex development is to improve the throughput, and coverage and reduce the latency of the UL communication by allowing the UL reception during the DL transmission. READ MORE
-
5. Anomaly Detection for Network Traffic in a Resource Constrained Environment
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Networks connected to the internet are under a constant threat of attacks. To protect against such threats, new techniques utilising already connected hardware have in this thesis been proven to be a viable solution. READ MORE