Essays about: "implementation approaches"

Showing result 1 - 5 of 461 essays containing the words implementation approaches.

  1. 1. ”Just add women and stir?” En diskursanalys av kvinnligt deltagande och aktörskap i resolution 2122 och Nigerias nationella handlingsplan för implementering av kvinnor, fred och säkerhet

    University essay from Lunds universitet/Statsvetenskapliga institutionen

    Author : Anna Bernhardsson; [2019]
    Keywords : Nigeria; National Action Plan; Resolution 2122; Feminist Critical Dicsourse analysis; Agency; Participation; Law and Political Science;

    Abstract : Based on the extensive criticism surrounding the victimization of women in the women, peace and security agenda discourse, this essay seeks to analyze the discourse after the adaption of resolution 2122, a widely recognized step in the direction to focus more on women’s participation. The aim of the study is thus to analyze the discourse around women’s participation and agency on a global and national level and thereby analyze if the discourse prescribes opportunities or limits for women’s agency and participation. READ MORE

  2. 2. DSP Design With Hardware Accelerator For Convolutional Neural Networks

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Julian Hille; Lucas Santos Ferreira; [2019]
    Keywords : CNN; Hardware; Accelerator; DSP; Convolutional; Convolution; Neural; Network; Processor; Tensilica; FIR; Memory; SRAM; Technology and Engineering;

    Abstract : Convolutional Neural Networks impressed the world in 2012 by reaching state-of-the-art accuracy levels in the ImageNet Large Scale Visual Recognition Challenge. The era of machine learning has arrived and with it countless applications varying from autonomous driving to unstructured robotic manipulation. READ MORE

  3. 3. Performance Evaluation of Multicast Behavior in Congested Networks

    University essay from Blekinge Tekniska Högskola/Institutionen för tillämpad signalbehandling

    Author : Urmila Jyothula; [2019]
    Keywords : ;

    Abstract : Compuverde’s software-defined storage product uses multicast for the communication between servers in a cluster. The product makes use of IP UDP multicast for sending status messages between the servers that forms the storage cluster. The storage clusters capacity and performance scales linear to the number of servers in the cluster. READ MORE

  4. 4. Implementation and Evaluation of Encoder Tools for Multi-Channel Audio

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Tomas Malmelöv; [2019]
    Keywords : Scene based audio; 3D audio; Spatial audio; Ambisonics; HOA; Multi-channel audio; Audio compression; MPEG-H;

    Abstract : The increasing interest for immersive experiences in areas such as augmented and virtual reality makes high quality 3D sound more important than ever before. A technique for capturing and rendering 3D audio which has received more attention during the last twenty years are Higher Order Ambisonics (HOA). READ MORE

  5. 5. Information-Theoretic Framework for Network Anomaly Detection: Enabling online application of statistical learning models to high-speed traffic

    University essay from KTH/Matematisk statistik

    Author : Gabriel Damour; [2019]
    Keywords : Network Security; Distributed Denial of Service; DDoS; DoS; Anomaly Detection; Intrusion Detection; Attack Source Identification; Information Theory; Statistical Learnin; Nätverkssäkerhet; Distribuerad Överbelastningsattack; DDoS; DoS; Anomalidetektering; Intrångsdetektering; Identifiering av Attackkällor; Informationsteori; Maskininlärning;

    Abstract : With the current proliferation of cyber attacks, safeguarding internet facing assets from network intrusions, is becoming a vital task in our increasingly digitalised economies. Although recent successes of machine learning (ML) models bode the dawn of a new generation of intrusion detection systems (IDS); current solutions struggle to implement these in an efficient manner, leaving many IDSs to rely on rule-based techniques. READ MORE