Essays about: "use computer"
Showing result 1 - 5 of 1578 essays containing the words use computer.
-
1. Force Type ID, a Two-Factor-Authentication based on force sensitive keys and password
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The conventional computer keyboard keys work as binary switch systems and have stayed the same since the invention of typewriters. With the accelerated progress in forcesensing technology, force-sensitive keyboards have become viable consumer products due to advancements in manufacturing. READ MORE
-
2. The association between obesity, low-grade inflammation, self-reported knee symptoms and radiographic knee osteoarthritis in individuals with knee pain : A longitudinal cohort study
University essay from Högskolan i Halmstad/Akademin för företagande, innovation och hållbarhetAbstract : Abstract Background One of the earliest signs of knee osteoarthritis (OA) is knee pain which correlates with inflammation and disease severity. Knee OA affects 260 million worldwide, and is in similarity with obesity, characterized by ongoing low-grade inflammation. READ MORE
-
3. Real-Time System Benchmarking with Embedded Linux and RT Linux on a Multi-Core Hardware Platform
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : To catch up with the growing trend of parallelism, this thesis work focuses on the adaption of embedded real-time systems to a multicore platform. We use the embedded system of Xilinx ZCU-102, a multicore board, as an example of an embedded system without getting deep into its architecture. READ MORE
-
4. Linking for Peace. An affordance perspective of LinkedIn as an instrument for peace professionals to advance constructive conflict resolution and transformative efforts
University essay from Institutionen för tillämpad informationsteknologiAbstract : Has LinkedIn become the platform for a global community of practice for peace professionals? Does it have the potential to be? An inductive approach to Reflexive Thematic Analysis (RTA) following Braun and Clarke’s six-phase methodology was used as an analytic instrument on empirical data from 13 semi-structured interviews with professionals in peace mediation, using the theoretical lens of affordances. The participants in the study were found to use LinkedIn to create and sustain meaningful connections globally and across sectors, learn from empirical knowledge, stories and insights from others and explore economic opportunities. READ MORE
-
5. A type-driven approach for sensitivity checking with branching
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Differential Privacy (DP) is a promising approach to allow privacy preserving statistics over large datasets of sensitive data. It works by adding random noise to the result of the analytics. Understanding the sensitivity of a query is key to add the right amount of noise capable of protecting privacy of individuals in the dataset. READ MORE