Hae
Aineistot 71-80 / 83
Automatic Label Placement for Technical Drawings
(2020-06-25)
A lot of research has been done to automatically label geographical maps. In the field of study, other types of images, like technical drawings, are almost completely disregarded. In enormous industrial projects, like ...
Using LSTM network to detect R-peaks from noisy ECG signals
(2020-08-17)
Electrocardiogram (ECG) is one of the most important signals that can be measured from the human body. It contains lots of important information from the function of the heart, which can be utilized e.g. in medical diagnosis. ...
Developer’s Perspective on Implementing a Tool to Facilitate Development of Robotic Process Automation
(2020-06-17)
Software robots are programs that can mimic human behavior to interact with other desk-
top or web applications used in various business processes. Robotic Process Automation
(RPA) is an emerging technology that aims to ...
Utilitarian Analysis of Mass Surveillance : Panopticons and Privacy
(2020-07-30)
Utilitarian thinking comes under the wider framework of normative ethical theories which judges the morality of any act based on the outcomes achieved. Normative Ethics is the discipline of social sciences that comes under ...
A Study on UWB-Aided Localization for Multi-UAV Systems in GNSS-Denied Environments
(2020-08-23)
Unmanned Aerial Vehicles (UAVs) have seen an increased penetration in industrial applications in recent years. Some of those applications have to be carried out in GNSS-denied environments. For this reason, several ...
Classification of small renal masses based on CT images and machine learning algorithms
(2019-05-10)
Kidney tumor is among the leading causes of tumors and deaths worldwide. In all kidney tumor cases, an increasing number of small renal masses (SRMs) with a size smaller than 4 cm have been detected and they are becoming ...
Experimental Penetration Testing Teaching and Learning for High School Students Using Cloud Computing
(2019-06-14)
The need for high school students trained in ICT to developing cybersecurity skills implies the understanding of threats on security. Considering that the aim of hacking is to circumvent restrictions, the goal of this ...
Using machine learning for assessing customer suitability in business to business environment
(2019-06-04)
The industry has gone through multiple revolutions as a result of advancements in technology. Now, it might be on the verge of another one because of machine learning. In business to business setting, sales processes include ...
Implementing web accessibility to an existing web application
(2020-11-30)
Web accessibility is becoming more and more important as societies around the world rely more and more on digital services. It enables the services to be used by many different kinds of users. It is starting to become a ...
Influence of Information System on Emergency Department Shift Leaders’ Mobility
(2020-12-21)
Emergency departments are hospital units for patients, who need emergency and acute care. Due to the state of patients, shift leader nurses and physicians need to do important decisions concerning patients’ treatment and ...