Essays about: "source selection"

Showing result 1 - 5 of 226 essays containing the words source selection.

  1. 1. THE ADAPTATION CYCLE OF COMIC BOOKS AND CINEMA: Authorship, Intermediality and Fidelity in Batman Adaptations

    University essay from Göteborgs universitet/Institutionen för språk och litteraturer

    Author : Nicola Camoglio; [2023-09-20]
    Keywords : English; Batman; The dark knight; Tim Burton; Joel Schumacher; Bruce Timm; Christopher Nolan; Adam West; authorship; adaptation; intermediality; adaptive revision; dialogism; geneticism; fidelity;

    Abstract : This thesis explores the adaptation process from comic books to cinema, by leveraging theoretical frameworks found in the modern field of adaptation studies. The focus lies primarily on film adaptations of Batman, one of the most famous and well-regarded characters from the comic book medium. READ MORE

  2. 2. Handling Third-Party Component Licenses:A Case Study in a Swedish Company : How well do existing license management tools detect potentially unsafe third-party component licenses?

    University essay from Högskolan Dalarna/Informatik

    Author : Fanny Bruckner; Isac Njie; [2023]
    Keywords : Third-party components; software licenses; component analysis tools;

    Abstract : Modern software development relies heavily on third-party components, which are pre-built software modules developed by other organisations and can be either open-source or commercial. These components serve as building blocks for developers to create complex applications more efficiently. READ MORE

  3. 3. Distributed Artificial Intelligence Based on Edge Computing

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Rebecca Fagerström; Simon Neüman; [2023]
    Keywords : Internet of Things; IoT; Edge Computing; Distributed Intelligence; Artificial Intelligence; AI;

    Abstract : The future Internet is expected to be driven by the prevalence of the Internet of Things (IoT), where it is envisioned that anything can be connected. In the last decade, there has been a paradigm shift in IoT from centralized cloud computing to so-called edge computing in order to compute tasks closer to the source of data generation. READ MORE

  4. 4. Solutions for presence detection in an intercom door station

    University essay from Lunds universitet/Industriell elektroteknik och automation

    Author : Anton Bengtsson; Måns Andreasson; [2023]
    Keywords : presence detection; sensor technology; PIR; ultrasonic; radar; intercom; Technology and Engineering;

    Abstract : In this work, different solutions for human presence detection in a door intercom device are examined. The study was conducted at a company in Lund, Sweden. READ MORE

  5. 5. Design and Implementation of an Efficient Intrusion Response System for 5G RAN Baseband Units

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Mirna Ghazzawi; Adil Imran; [2023]
    Keywords : Intrusion Response System; Security; OSSEC; Radio Access Network; Baseband Units;

    Abstract : The 5G Radio Access Network (RAN) is a critical system that must be secured against potential attacks, particularly its Base-Band Unit (BBU), which is a common target for intrusions. Ericsson, which is a big provider of such systems, has placed significant emphasis on implementing Intrusion Detection Systems (IDS) to detect threats. READ MORE