Essays about: "uses of computer space technology"
Showing result 11 - 15 of 26 essays containing the words uses of computer space technology.
-
11. Development and testing of algorithms for optimal thruster command distribution during MTG orbital manoeuvres
University essay from Luleå tekniska universitet/RymdteknikAbstract : An accurate satellite attitude and orbit control is a key factor for a successful mission. It guarantees for example sun acquisition on solar panels, fine pointing for optimal telescope usage or satellite lifting to reach higher orbits, when required. READ MORE
-
12. Reinforcement Learning– Intelligent Weighting of Monte Carlo and Temporal Differences
University essay from Lunds universitet/Institutionen för reglerteknikAbstract : In Reinforcement learning the updating of the value functions determines the information spreading across the state/state-action space which condenses the valuebased control policy. It is important to have an information propagation across the value domain in a manner that is effective. READ MORE
-
13. Path Planning with Weighted Wall Regions using OctoMap
University essay from Luleå tekniska universitet/RymdteknikAbstract : In the work of the Control Engineering research group of the Department of Computer Science, Electrical and Space Engineering, Signals and systems at Luleå University of Technology a need had arisen for a path planning algorithm. The ongoing research with Unmanned Aerial Vehicles(UAVs) had so far been done with any complicated paths being created manually with waypoints set by the uses. READ MORE
-
14. Real-Time Persistent Mesh Painting with GPU Particle Systems
University essay from Linköpings universitet/InformationskodningAbstract : Particle systems are used to create visual effects in real-time applications such as computer games. However, emitted particles are often transient and do not leave a lasting impact on a 3D scene. READ MORE
-
15. Platforms for Real-time Moving Object Location Stream Processing
University essay from KTH/GeoinformatikAbstract : Boarder security is usually based on observing and analyzing the movement of MovingPoint Objects (MPOs): vehicle, boats, pedestrian or aircraft for example. This movementanalysis can directly be made by an operator observing the MPOs in real-time, but theprocess is time-consuming and approximate. READ MORE