Advanced search
Showing result 1 - 5 of 180 essays matching the above criteria.
-
1. How to Draw a Circle: Investigating Relationship Management in Circular Business Companies
University essay from Handelshögskolan i Stockholm/Institutionen för företagande och ledningAbstract : Despite the recent surge in circular business model (CBM) research, the discipline is still in its infancy. The field is primarily driven by practitioners and lacks suggestive frameworks, which complicates current CBM trials. READ MORE
-
2. Modulating Depth Map Features to Estimate 3D Human Pose via Multi-Task Variational Autoencoders
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Human pose estimation (HPE) constitutes a fundamental problem within the domain of computer vision, finding applications in diverse fields like motion analysis and human-computer interaction. This paper introduces innovative methodologies aimed at enhancing the accuracy and robustness of 3D joint estimation. READ MORE
-
3. Evaluation and Optimization of LTE-V2X Mode 4 under Aperiodic Messages of Variable Size
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Vehicular networks connect vehicles for improved road safety and efficiency with the assistance of wireless information exchange. Vehicular networks are based on the frequent broadcast of awareness messages referred to as CAM (Cooperative Awareness Messages) or BSM (Basic Safety Message) in the ETSI and SAE standards, respectively. READ MORE
-
4. EMONAS : Evolutionary Multi-objective Neuron Architecture Search of Deep Neural Network
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Customized Deep Neural Network (DNN) accelerators have been increasingly popular in various applications, from autonomous driving and natural language processing to healthcare and finance, etc. However, deploying them directly on embedded system peripherals within real-time operating systems (RTOS) is not easy due to the paradox of the complexity of DNNs and the simplicity of embedded system devices. READ MORE
-
5. Profile Based Access Control Model Using JSON Web Tokens
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. READ MORE