Essays about: "Blekinge Tekniska Högskola"
Showing result 16 - 20 of 4514 essays containing the words Blekinge Tekniska Högskola.
-
16. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE
-
17. Comparing Static and Dynamic Synchronization of GUI-based tests: An Industrial study
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Background. Speed is getting more and more critical in modern Software Engineering to be able to respond to users’ expectations of product development. One practice that takes a significant amount of time in the process of releasing software to the customers is testing. READ MORE
-
18. Comparison of Energy Usage and Response Time for Web Frameworks
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik; Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. Environmental sustainability and reducing energy consumption are important and relevant topics today. Energy consumption by data centres is constantly increasing. One factor that could be affecting this is what web frameworks are being used. READ MORE
-
19. Prioritized Database Synchronization using Optimization Algorithms
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : .... READ MORE
-
20. Time-based Key for Coverless Audio Steganography: A Proposed Behavioral Method to Increase Capacity
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. Coverless steganography is a relatively unexplored area of steganography where the message is not embedded into a cover media. Instead the message is derived from one or several properties already existing in the carrier media. This renders steganalysis methods used for traditional steganography useless. READ MORE