In view of the fact that most of the synthetic refrigerants, in case of leakage or release, are harmful to the environment by contributing in global warming or depleting stratospheric ozone layer, many research works have been done recently to find alternative refrigerants posing no or negligible threat to the environment.
Among alternative refrigerants, ammonia, a natural refrigerant...
Accurate measurements from sensors measuring the vehicle’s lateral behavior are vital in today’s vehicle dynamic control systems such as the Electronic Stability Program (ESP). This thesis concerns accurate plausibilisation of two of these sensors, namely the yaw rate sensor and the lateral acceleration sensor.
The estimation is based on Kalman filtering and culminates in the...
Speech Recognition is the process of converting spoken input to digital output, such as text. Speech recognition systems provide computers with the ability to listen to user speech and determine what is said.
The Speech Recognition process can be divided into these four steps:
Speech is converted to digital signals.
Actual speech sounds are extracted from the sounds (based...
Project Description:In this project, we will be designing a simple shopping mall using object oriented technology. The mall will provide a soothing shopping experience for customers, while at the same time allowing us to explore design patterns and other features object oriented technology.
The requirements:The system will allow more than one shop owner to set up different...
Thanks to advances in wide-area network technologies and the low cost of computing resources, Grid computing came into being and is currently an active research area. One motivation of Grid computing is to aggregate the power of widely distributed resources, and provide non-trivial services to users. To achieve this goal, an efficient Grid scheduling system is an essential part...
In modern times mobile devices are a increasing technology and malicious users are increasing as well. On a mobile device it often exist valuable private information that a malicious user is interested in and it often has lower security features implemented compared to computers. It is therefore important to be aware of the security risks that exist when using a mobile device...
The main objective of this work is to collaborate with the Service Composition Tool investigation in the School of Mathematics and Systems Engineering technology at Växjö University.
The school is focusing its efforts in the software engineering technology. Presently one of the most promising ways to improve the software development is to look at various possible solutions to...