• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 25
  • 9
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 53
  • 53
  • 13
  • 12
  • 12
  • 11
  • 10
  • 10
  • 10
  • 10
  • 9
  • 9
  • 7
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Enhancing Creative, Learning and Collaborative Experiences through Augmented Reality-compatible Internet-of-Things Devices

Pashin Farsak Raja (15348238) 29 April 2023 (has links)
<p>The "Maker Movement" is a cultural phenomena rooted in DIY culture, which stresses making devices and creations on your own rather than purchasing it ready-made. At the core of the Maker Movement, is the "Maker Mindset"; a collection of attitudes, beliefs and behaviors that emphasize the importance of creativity, experimentation and innovation in the learning process. Since the Maker Mindset embodies constructionist principles at its core that push makers to experiment and problem-solve by collaborating with fellow makers through hands-on activities, it can be said that these activities comprise of Creative, Learning and Collaborative experiences. While Internet-of-Things devices have long been used to enhance these activities, research pertaining to using Augmented Reality in tandem with IoT for the purpose of enhancing experiences core to the Maker Mindset is relatively unexplored. Three different systems were developed with the goal of addressing this -- MicrokARts, ShARed IoT and MechARspace. Each system focuses on enhancing one of the three core experiences through AR-compatible IoT devices, whilst ensuring that they do not require prerequisite knowledge in order to author AR experiences. These systems were evaluated through user studies and testing over a variety of age-groups, with each system successfully enhancing one core experience each through the use of AR-IoT interactions.</p>
52

Distributed Algorithms for Multi-robot Autonomy

Zehui Lu (18953791) 02 July 2024 (has links)
<p dir="ltr">Autonomous robots can perform dangerous and tedious tasks, eliminating the need for human involvement. To deploy an autonomous robot in the field, a typical planning and control hierarchy is used, consisting of a high-level planner, a mid-level motion planner, and a low-level tracking controller. In applications such as simultaneous localization and mapping, package delivery, logistics, and surveillance, a group of autonomous robots can be more efficient and resilient than a single robot. However, deploying a multi-robot team by directly aggregating each robot's planning hierarchy into a larger, centralized hierarchy faces challenges related to scalability, resilience, and real-time computation. Distributed algorithms offer a promising solution for introducing effective coordination within a network of robots, addressing these issues. This thesis explores the application of distributed algorithms in multi-robot systems, focusing on several essential components required to enable distributed multi-robot coordination, both in general terms and for specific applications.</p>
53

Návrh hardwarového šifrovacího modulu / Design of hardware cipher module

Bayer, Tomáš January 2009 (has links)
This diploma’s thesis discourses the cryptographic systems and ciphers, whose function, usage and practical implementation are analysed. In the first chapter basic cryptographic terms, symmetric and asymetric cryptographic algorithms and are mentioned. Also usage and reliability are analysed. Following chapters mention substitution, transposition, block and stream ciphers, which are elementary for most cryptographic algorithms. There are also mentioned the modes, which the ciphers work in. In the fourth chapter are described the principles of some chosen cryptographic algorithms. The objective is to make clear the essence of the algorithms’ behavior. When describing some more difficult algorithms the block scheme is added. At the end of each algorithm’s description the example of practical usage is written. The chapter no. five discusses the hardware implementation. Hardware and software implementation is compared from the practical point of view. Several design instruments are described and different hardware design programming languages with their progress, advantages and disadvantages are mentioned. Chapter six discourses the hardware implementation design of chosen ciphers. Concretely the design of stream cipher with pseudo-random sequence generator is designed in VHDL and also in Matlab. As the second design was chosen the block cipher GOST, which was designed in VHDL too. Both designs were tested and verified and then the results were summarized.

Page generated in 0.027 seconds