Essays about: "profiling system"
Showing result 6 - 10 of 61 essays containing the words profiling system.
-
6. Load profiling and customer segmentation for demand-side management
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The energy transition is accompanied by massive electrification of uses and sectors such as transport. As a result, the pressure on the electricity grid is increasing, and the time to connect to the power system is lengthening. READ MORE
-
7. Transfer Learning for Automatic Author Profiling with BERT Transformers and GloVe Embeddings
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Historically author profiling has been used in forensic linguistics. However, it is not until the last decades that the analysis method has worked into computer science and machine learning. In comparison, determining author profiling characteristics in machine learning is nothing new. READ MORE
-
8. Evaluation of cache memory configurations with performance monitoring in embedded real-time automotive systems : Determining performance characteristics of cache memory with hardware counters and software profiling.
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Modern day automotive systems are highly dependent on real-time software control to manage the powertrain and high-level features, such as cruise control. The computational power available has increased tremendously from decades of microcontroller and hardware development on such platforms. READ MORE
-
9. Modelling and Run-Time Control of Localization System for Resource-Constrained Devices
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As resource-constrained autonomous vehicles are used for more and more applications, their ability to achieve the lowest possible localization error without expending more power than needed is crucial. Despite this, the parameter settings of the localization systems, both for the platform and the application, are often set arbitrarily. READ MORE
-
10. An Efficiency Evaluation of Far-Field Electromagnetic Deep Learning Side-Channel Attacks in Controlled Environments
University essay from Uppsala universitet/Signaler och systemAbstract : As more and more modern systems and products use built-in microcontrollers, hardware security becomes more important to protect against cyber-attacks. Internet of things devices, like Bluetooth devices, usually use an encryption algorithm to keep data safe from hackers. Advanced Encryption Standard (AES) is a commonly used encryption algorithm. READ MORE