Essays about: "power lines"
Showing result 6 - 10 of 224 essays containing the words power lines.
-
6. Freedom in the Digital Age - VAT challenges from data as currency and the platform economy
University essay from Lunds universitet/Institutionen för handelsrättAbstract : 2000-talet har introducerat nya sätt att bedriva e-handel, med plattformsekonomin som suddar ut gränserna för vilken person som tillhandahåller tjänster från ett mervärdesskatteperspektiv. Bitcoin har blivit pengar för internetåldern. READ MORE
-
7. Object Recognition and Tracking of Bolts: A Comparative Analysis of CNN Models and Computer Vision Techniques : A Comparison of CNN Models and Tracking Algorithms
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The newer generation industry 4.0 focuses on development of both flexibility and autonomy for power tools used by companies in different mechanical areas and assembly lines. One area for automation is the application of computer vision in power tools to detect, identify and track bolts. READ MORE
-
8. Evaluation of Geopositioning Using Frequency Responses From Radio Propagation Measurements
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Satellite reliant navigation systems may struggle in urban environments as tall buildings mayobstruct necessary direct lines of sight with satellites. There have been multiple studiesexamining how WIFI fingerprinting may be used for indoor positioning. READ MORE
-
9. Parallel Operation of Grid-Forming Power Inverters
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The use of renewable energy sources has been increasing during the last few years, both to obtain a less impacting energy production, and because of the limited fossil resources. Renewable sources are connected to the grid using inverters, which can be controlled in two main modes, grid-following, and grid-forming. READ MORE
-
10. LSTM-attack on polyalphabetic cyphers with known plaintext : Case study on the Hagelin C-38 and Siemens and Halske T52
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Polyalphabetic cyphers have been used for centuries and well into the 1970s to transmit all kinds of messages. Since then, computers and modern cryptography have taken over making bruteforce attacks unfeasible when designed properly. READ MORE