Advanced search

Showing result 1 - 5 of 90 essays matching the above criteria.

  1. 1. Evaluation and Optimization of LTE-V2X Mode 4 under Aperiodic Messages of Variable Size

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Md Mamunur Rashid; [2023]
    Keywords : LTE-V2X; aperiodic; variable size; CAM; Technology and Engineering;

    Abstract : Vehicular networks connect vehicles for improved road safety and efficiency with the assistance of wireless information exchange. Vehicular networks are based on the frequent broadcast of awareness messages referred to as CAM (Cooperative Awareness Messages) or BSM (Basic Safety Message) in the ETSI and SAE standards, respectively. READ MORE

  2. 2. Enhancing human-robot interaction using mixed reality

    University essay from Högskolan i Skövde/Institutionen för ingenjörsvetenskap

    Author : Santiago Molina Morillas; [2023]
    Keywords : Human-robot interaction; mixed reality; autonomous mobile robots; safety;

    Abstract : Industry 4.0 is a new phase of industrial growth that has been ushered in by the quick development of digital technologies like the Internet of Things (IoT), artificial intelligence (AI), and robots. Collaborative robotic products have appeared in this changing environment, enabling robots to collaborate with people in open workspaces. READ MORE

  3. 3. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jakub Reha; [2023]
    Keywords : Graph neural networks; Temporal graphs; Benchmark datasets; Anomaly detection; Heterogeneous graphs; Provenance graphs; Grafiska neurala nätverk; temporala grafer; benchmark-datauppsättningar; anomalidetektering; heterogena grafer; härkomstgrafer;

    Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE

  4. 4. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Krister Georges; Per Jahnstedt; [2023]
    Keywords : NETCONF; MbedTLS; YANG; Embedded; SNMP; XML; HMS; IETF; IIoT; ABCC; Wireshark; TLS; Porting; RTOS; IoT; Interoperability; Networking; Security; Protocols; C C ; Embedded Linux; Configuration Management; Microcontroller; Microprocessor; Scalability; Hardware Interfaces; Hardware; Open source; QA; Data Modeling; System Integration; Automation;

    Abstract : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. READ MORE

  5. 5. Using Approximate Computing Circuits to Optimize Power of an ASIC

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Padmashree Nuggehalli Srinivasa; Shi-Tien Hsing; [2023]
    Keywords : ASIC; Power; Optimization; Approximate Arithmetic Circuits; Approximate Computing; Technology; Technology and Engineering;

    Abstract : The growing demand for network cameras to support real-time image processing and machine-learning applications has created a need for low-power solutions. Although technology scaling makes complex computations feasible, voltage scaling is limited, leading to higher power density and dark silicon problems. READ MORE