Essays about: "utan datorer"

Showing result 1 - 5 of 62 essays containing the words utan datorer.

  1. 1. Optical Communication using Nanowires and Molecular Memory Systems

    University essay from Lunds universitet/Fysiska institutionen; Lunds universitet/Synkrotronljusfysik

    Author : Thomas Kjellberg Jensen; [2024]
    Keywords : neuromorphic computing; nanowire; molecular dye; DASA photoswitch; OBIC; Physics and Astronomy;

    Abstract : Neuromorphic computational networks, inspired by biological neural networks, provide a possible way of lowering computational energy cost, while at the same time allowing for much more sophisticated devices capable of real-time inferences and learning. Since simulating artificial neural networks on conventional computers is particularly inefficient, the development of neuromorphic devices is strongly motivated as the reliance on AI-models increases. READ MORE

  2. 2. Robust Statistical Jump Models with Feature Selection

    University essay from Lunds universitet/Matematisk statistik

    Author : Jonatan Persson; [2023]
    Keywords : Clustering; Jump; Feature selection; Robust; Mathematics and Statistics;

    Abstract : A large area in statistics and machine learning is cluster analysis. This field of research concerns the design of algorithms that allow computers to automatically categorize a set of observations into different groups in a reasonable way, without any prior information about which observations belongs to which group. READ MORE

  3. 3. Food Order Web Application Using React

    University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Author : Manaf Dawud Nantor; [2023]
    Keywords : JavaScript; React; Human-Computer Interaction; HTML; JavaScript; React; Människan-datorinteraktion; HTML;

    Abstract : Människan-datorinteraktion (HCI) är ett studieområde som fokuserar på design av datorteknik, särskilt interaktionen mellan människor (användarna) och datorer. Detta projekt beskriver utveckling av en webbapplikation (React) för kunder att göra sina onlineköp. READ MORE

  4. 4. LSTM-attack on polyalphabetic cyphers with known plaintext : Case study on the Hagelin C-38 and Siemens and Halske T52

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oriol Closa; [2023]
    Keywords : ;

    Abstract : Polyalphabetic cyphers have been used for centuries and well into the 1970s to transmit all kinds of messages. Since then, computers and modern cryptography have taken over making bruteforce attacks unfeasible when designed properly. READ MORE

  5. 5. Analysis of the security of a VXLAN network

    University essay from KTH/Hälsoinformatik och logistik

    Author : Markus Rehnberg; Erik Ekblad; [2023]
    Keywords : VXLAN; VLAN; security; networking; cloud-computing; VXLAN; VLAN; säkerhet; nätverk; molntjänster;

    Abstract : Traditionally, VLANs have been the most suitable solution for connecting computers. This, in line with the increased use of cloud services in recent years, has given rise to problems with scalability and security within VLAN networks, which need to be investigated. READ MORE