Essays about: "mathematical background"
Showing result 1 - 5 of 75 essays containing the words mathematical background.
-
1. Refining the particulate matter airway deposition arising from indoor cooking-related biomass combustion for children in the Haramaya district in Ethiopia
University essay from Lunds universitet/Ergonomi och aerosolteknologiAbstract : Background: Air pollution, a global issue affecting millions of individuals, is linked to adverse health effects on the respiratory system, but also to e.g., cancer and cardiovascular ailments. In low-income countries, cooking is often conducted by biomass-combustion, causing women and children to be exposed to high levels of indoor air pollution. READ MORE
-
2. Homomorphic encryption
University essay from KTH/Matematik (Avd.)Abstract : The problem of constructing a secure encryption scheme that allows for computation on encrypted data was an open problem for more than 30 years. In 2009, Craig Gentry solved the problem, constructing the first fully homomorphic encryption (FHE) scheme. READ MORE
-
3. Constraining the Higgs width in Higgs production associated with a top quark pair
University essay from Lunds universitet/Fysiska institutionen; Lunds universitet/Teoretisk partikelfysik - Geonomgår omorganisationAbstract : In this thesis we study the width of the Higgs boson in the process pp → t ̄t 4l at LO using MadGraph5_aMC@NLO to generate the events. The contributions including the Higgs signal, continuum background and interference were considered in order to calculate the expected number of events in a broad range of four-lepton invariant masses. READ MORE
-
4. Performance Evaluation of (Spherical) Harmonics Virtual Lights for Real-time Global Illumination using Vulkan
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. Global illumination is not trivial to compute in real-time computer graphics. One approximate solution is to distribute virtual light sources from a primary light, to then apply direct light calculations to said virtual lights. This can effectively estimate two-bounce illumination. READ MORE
-
5. Method of finding the minimum number of sources of indicators of compromise to cover the maximum set
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. With the increasing demand for cybersecurity, there is a growing interest in understanding cyber-attack surfaces and vectors. READ MORE