Essays about: "proof-of-concept"

Showing result 16 - 20 of 792 essays containing the word proof-of-concept.

  1. 16. An Integrated Room Booking and Access Control System for Public Spaces

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Jaffar Kamil; Mohamed Amer; [2023]
    Keywords : Integrated Systems; Room Booking System; Access Control System; Bank ID; Mobile Applications;

    Abstract : Public spaces, especially educational institutions like universities, encounter challenges with their room booking and access control systems. These challenges commonly manifest as overlapping bookings and unauthorized entry. The latter issue, unauthorized access, specifically stems from inadequate integration between the respective systems. READ MORE

  2. 17. Analysis of Mutable Game Environments Built on a Tetrahedral Mesh : Tetras, a Potential Alternative to Voxels

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Noah Tell; [2023]
    Keywords : Voxels; Tetrahedron; Tetrahedral Mesh; Tetrahedralization; Tessellation; Mutable Environment; Editable Terrain; Deformable Environment; Boolean Operations; Real-Time; Computer Games; Computational Geometry; Voxlar; Tetrahedror; Tetrahedralisering; Tessellering; Formbar Terräng; Booliska Operationer; Realtid; Datorspel; Beräkningsgeometri;

    Abstract : Historically 3D game environments have almost always been immutable. Mutable environments are a technical challenge that will affect performance. For games of the future to continue approaching realism, mutable environments are an essential step. READ MORE

  3. 18. Profile Based Access Control Model Using JSON Web Tokens

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Mustafa Albayati; Aslan Murjan; [2023]
    Keywords : access control; profiles; IoT; device; OpenIDC; Technology and Engineering;

    Abstract : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. READ MORE

  4. 19. Machine Learning for State Estimation in Fighter Aircraft

    University essay from KTH/Optimeringslära och systemteori

    Author : Axel Boivie; [2023]
    Keywords : State estimation; machine learning; fighter aircraft; neural networks; long short- term memory; LSTM; sensor fusion; air data system; ADS.; Tillståndsestimering; maskininlärning; stridsflygplan; neurala nätverk; sensorfusion; luftdatasystem.;

    Abstract : This thesis presents an estimator to assist or replace a fighter aircraft’s air datasystem (ADS). The estimator is based on machine learning and LSTM neuralnetworks and uses the statistical correlation between states to estimate the angleof attack, angle of sideslip and Mach number using only the internal sensorsof the aircraft. READ MORE

  5. 20. Back-end for Front-end Connectorto Reduce Development Time : A Proof of Concept Project

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Mattias Svensson; Alexander Runemark; [2023]
    Keywords : ;

    Abstract : This project, in collaboration with Consid AB, aims to develop a softwarethat reduces the time to market for new web projects to their customers. Theproject is called BFFConnector and handles requests and responses betweendifferent Content Management Systems (CMS) and the back-end server viaa structured communication channel (API). READ MORE