Essays about: "source selection"
Showing result 1 - 5 of 226 essays containing the words source selection.
-
1. THE ADAPTATION CYCLE OF COMIC BOOKS AND CINEMA: Authorship, Intermediality and Fidelity in Batman Adaptations
University essay from Göteborgs universitet/Institutionen för språk och litteraturerAbstract : This thesis explores the adaptation process from comic books to cinema, by leveraging theoretical frameworks found in the modern field of adaptation studies. The focus lies primarily on film adaptations of Batman, one of the most famous and well-regarded characters from the comic book medium. READ MORE
-
2. Handling Third-Party Component Licenses:A Case Study in a Swedish Company : How well do existing license management tools detect potentially unsafe third-party component licenses?
University essay from Högskolan Dalarna/InformatikAbstract : Modern software development relies heavily on third-party components, which are pre-built software modules developed by other organisations and can be either open-source or commercial. These components serve as building blocks for developers to create complex applications more efficiently. READ MORE
-
3. Distributed Artificial Intelligence Based on Edge Computing
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : The future Internet is expected to be driven by the prevalence of the Internet of Things (IoT), where it is envisioned that anything can be connected. In the last decade, there has been a paradigm shift in IoT from centralized cloud computing to so-called edge computing in order to compute tasks closer to the source of data generation. READ MORE
-
4. Solutions for presence detection in an intercom door station
University essay from Lunds universitet/Industriell elektroteknik och automationAbstract : In this work, different solutions for human presence detection in a door intercom device are examined. The study was conducted at a company in Lund, Sweden. READ MORE
-
5. Design and Implementation of an Efficient Intrusion Response System for 5G RAN Baseband Units
University essay from Linköpings universitet/Databas och informationsteknikAbstract : The 5G Radio Access Network (RAN) is a critical system that must be secured against potential attacks, particularly its Base-Band Unit (BBU), which is a common target for intrusions. Ericsson, which is a big provider of such systems, has placed significant emphasis on implementing Intrusion Detection Systems (IDS) to detect threats. READ MORE