Essays about: "truncation"
Showing result 1 - 5 of 32 essays containing the word truncation.
-
1. Audibility & Preference of DA Overload Associated with True Peak : Investigation of claims made against overload prevention
University essay from Luleå tekniska universitet/Musik, medier och teaterAbstract : The conversion of audio from the digital to analog domain has the potential to result in distortion due to converter overload. This occurs because some peaks in the signal cannot be defined digitally and only become problematic during the conversion into the analog domain, exceeding the level that can be represented by the converter, causing it to overload. READ MORE
-
2. A Meta-narrative Review of Recent Advancements in Material Footprint Methodologies
University essay from KTH/Hållbar utveckling, miljövetenskap och teknikAbstract : The circular economy is a strategy that aims at closing material loops and lower resource consumption. Resource use indicators, like the material footprint, can play an important role in this transition. READ MORE
-
3. Zero Spectrum Subalgebras of K[x] Described by Higher Derivatives
University essay from Lunds universitet/Matematik LTHAbstract : Unital subalgebras of finite codimension in the polynomial ring $\mathbb{K}[x]$ are described by a finite number of so called subalgebra conditions over a finite set in $\mathbb{K}$ named the subalgebra spectrum. Restricting attention to subalgebras whose spectrum is the singleton $\{0\}$ reveals a rather well behaved class of subalgebras, called almost monomial from the fact that these contain an ideal consisting of all monomials above a certain degree. READ MORE
-
4. Solving Differential Equations using Data-Driven Adaptive Numerical Method
University essay from KTH/Skolan för teknikvetenskap (SCI)Abstract : Accuracy and efficiency have always been of great concern when solving differential equations. One approach to improve accuracy is by introducing a neural network, whose role is to learn the local truncation error (LTE) of a numerical method. READ MORE
-
5. Keeping an Indefinitely Growing Audit Log
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : An audit log enables us to discover malfeasance in a system and to understand a security breach after it has happened. An audit log is meant to preserve information about important events in a system in a non-repudiable manner. Naturally, the audit log is often a target for malicious actors trying to cover the traces of an attack. READ MORE