Month: August 2019
How to Train a Doodle Image Classifier and Recognize Doodles in the Cloud
As part of the lecture “Software Development for Cloud Computing” we developed a doodle image recognition game. The idea came to us when we were searching for possible mini-games for our semester project “Peers – The Party”, an iOS app using Apple’s MultipeerConnectivity framework.
Evaluating and Visualizing Statistical Bot Data
The idea Video game streaming has taken over a big part of the commercial video game scene with Twitch being its biggest platform. Viewers are able to communicate with other viewers and streamers through the chat, or watch their previous streams or highlights. These highlights are made by streamers creating short clips of their favourite…
Production Monitoring – Industry 4.0
When I was invited to a design thinking workshop of the summer school of Lucerne – University of Applied Sciences and Arts, I made my first experience with the end user interaction part of Industry 4.0. It was an awesome week with a lot of great people and made me interested in the whole Industry…
JavaScript Performance optimization with respect to the upcoming WebAssembly standard
Written by Tim Tenckhoff – tt031 | Computer Science and Media 1. Introduction Speed and performance of the (worldwide) web advanced considerably over the last decades. With the development of sites more heavily reliant on JavaScript (JS Optimization, 2018) , the consideration of actions to optimize the speed and performance of web applications grows in…
How to create and integrate a customised classifier based on IBM Visual Recognition
Helga Schwaighofer – hs082 Celine Wichmann – cw089 Lea Baumgärtner – lb092 Motivation Imagine you are having a bad day, but you don’t know what to do. Your friends are not available, but you’d like to have advice depending on your mood. For that case, we created the Supporting Shellfish! This service generates advice based…
Mobile Security – How secure are our daily used devices?
Nowadays, the usage of mobile devices has become a part of our everyday life. A lot of sensitive and personal data is stored on these devices, which makes them more attractive targets for attackers. Also, many companies offer the possibility to work remotely, which results in storing confidential business information on private phones and therefore…
You must be logged in to post a comment.