Essays about: "person detection"
Showing result 6 - 10 of 106 essays containing the words person detection.
-
6. Imaging of the MTP joint: Developing an imaging protocol optimised for damage detection and 3D modelling
University essay from KTH/FysikAbstract : Walking without pain in the toe has a significant impact on a person’s well-being. Human mobility will be impaired in osteoarthritis of the big toe, and pain will occur during walking. By replacing the cartilage or bone injury with an individualised implant, osteochondral injuries to the knee and ankle can be treated. READ MORE
-
7. Emploging and improving machinelearning of detection of Phishing URLs
University essay from Blekinge Tekniska HögskolaAbstract : Background: Phishing is one type of the social engineering techniques to fool users by pretending tobe a trusted person and stealing users personal data. Quite often, Phishing spreads to email services, and browsers are not always able to block Phishing URLs. READ MORE
-
8. Living with Lipoedema : Designing Objects for the Body and Mind through First-Person Methods
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This project follows a Research through Design approach and through autobiographical design explores the question of how Interaction Design can support Lipoedema patients, by helping them cope with their body image in everyday life. Building on the concept of self-management for people with chronic medical conditions and a conscious connection between body and mind, I created a set of artefacts. READ MORE
-
9. Artificial Electronic Nurse : An IoT Based Health Monitoring System
University essay from Blekinge Tekniska Högskola/Institutionen för matematik och naturvetenskapAbstract : Context. Generally, health monitoring systems are used in hospitals, which are pricey and gigantic. But with the up gradation of sensors and modules, these devices are also available in portable sizes. These devices are divided into different types according to the disease. READ MORE
-
10. Authentication Techniques Based on Physical Layer Attributes
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE