Advanced search
Showing result 1 - 5 of 60 essays matching the above criteria.
-
1. Dynamic Modeling of Heat Power System : Modeling of a Heat Power System Using Physical and Data-driven Methods and Investigation of a Moving Boundary Method
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Our society is becoming more and more electrified every day. However, a significant portion of the world’s electricity generation relies on the combustion of fossil fuels to produce heat, which is subsequently harnessed to generate electricity. One way of generating electricity from heat is by utilizing a Rankine cycle. READ MORE
-
2. Vibration Avoidance Based on Model-Based Control Incorporating Input Shaping
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : VIBRATION AVOIDANCE, a technique to proactively remove unwanted or excessive vibrations in multi-joint industrial robots, has shown to be desired in various applications. A trade-off between vibration avoidance performance and path deviation has been thekey criteria for assessing the effectiveness and quality of an approach. READ MORE
-
3. A Tale of Two Domains: Automatic Identification of Hate Speech in Cross-Domain Scenarios
University essay from Stockholms universitet/Avdelningen för datorlingvistikAbstract : As our lives become more and more digital, our exposure to certain phenomena increases, one of which is hate speech. Thus, automatic hate speech identification is needed. READ MORE
-
4. Single-peaked gamma-ray bursts in the Fermi GBM catalogue
University essay from KTH/FysikAbstract : Gamma-ray burst light curves are notoriously irregular, yet a significant number consists of a single fast-rising, exponentially decaying pulse. These are called single-peaked light curves. READ MORE
-
5. Cybersecurity Evaluation of an IP Camera
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The prevalence of affordable internet-connected cameras has provided many with new possibilities, including keeping a watchful eye on property and family members from afar. In order to avoid serious breaches of privacy, it is necessary to consider whether these devices are secure. READ MORE