Hae
Aineistot 111-120 / 233
Automatic Label Placement for Technical Drawings
(2020-06-25)
A lot of research has been done to automatically label geographical maps. In the field of study, other types of images, like technical drawings, are almost completely disregarded. In enormous industrial projects, like ...
Using LSTM network to detect R-peaks from noisy ECG signals
(2020-08-17)
Electrocardiogram (ECG) is one of the most important signals that can be measured from the human body. It contains lots of important information from the function of the heart, which can be utilized e.g. in medical diagnosis. ...
Developer’s Perspective on Implementing a Tool to Facilitate Development of Robotic Process Automation
(2020-06-17)
Software robots are programs that can mimic human behavior to interact with other desk-
top or web applications used in various business processes. Robotic Process Automation
(RPA) is an emerging technology that aims to ...
Utilitarian Analysis of Mass Surveillance : Panopticons and Privacy
(2020-07-30)
Utilitarian thinking comes under the wider framework of normative ethical theories which judges the morality of any act based on the outcomes achieved. Normative Ethics is the discipline of social sciences that comes under ...
Novel Parallelization Techniques for Computer Graphics Applications
(2021-04-06)
Increasingly complex and data-intensive algorithms in computer graphics applications require software engineers to find ways of improving performance and scalability to satisfy the requirements of customers and users. ...
Classification of small renal masses based on CT images and machine learning algorithms
(2019-05-10)
Kidney tumor is among the leading causes of tumors and deaths worldwide. In all kidney tumor cases, an increasing number of small renal masses (SRMs) with a size smaller than 4 cm have been detected and they are becoming ...
Experimental Penetration Testing Teaching and Learning for High School Students Using Cloud Computing
(2019-06-14)
The need for high school students trained in ICT to developing cybersecurity skills implies the understanding of threats on security. Considering that the aim of hacking is to circumvent restrictions, the goal of this ...
Using machine learning for assessing customer suitability in business to business environment
(2019-06-04)
The industry has gone through multiple revolutions as a result of advancements in technology. Now, it might be on the verge of another one because of machine learning. In business to business setting, sales processes include ...
Security Analysis and Evaluation of Smart Toys
(2021-05-24)
During the last years, interconnectivity and merging the physical and digital technological dimensions have become a topic attracting the interest of the modern world. Internet of Things (IoT) is rapidly evolving as it ...
CUSTOMTOOLS as general integration platform for SOLIDWORKS - ERP data exchange
(2021-06-03)
This thesis introduces the extreme complexity behind CAD – ERP integrations in real world scenarios
as a reasoning why a general-purpose integration for all system variations simply does not exist.
Delivered integrations ...