Essays about: "Conclusion of computer system"
Showing result 16 - 20 of 126 essays containing the words Conclusion of computer system.
-
16. Vibration reduction over junctions in buildings
University essay from KTH/Marcus Wallenberg Laboratoriet MWLAbstract : Structure borne sound can travel multiple paths from one office to another and choosing to sound insulate a specific building element can be difficult since all the building elements are connected together and form a coupled system. The current approach by engineers when investigating transmission paths between spaces in a building is using a computer model and assuming that the junctions are firmly clamped or free. READ MORE
-
17. Upscaling Electronics Repair to Support a Circular Economy in Sweden: A Focus on Cellphones Through the Lens of Policy Intervention
University essay from Lunds universitet/Internationella miljöinstitutetAbstract : E-waste is a growing waste problem around the world, and Sweden is no exception. However, the Swedish WEEE system is having issues combating the problem – particularly when it comes to cellphones. READ MORE
-
18. Interaction Design for Remote Control of Military Unmanned Ground Vehicles
University essay from Linköpings universitet/Interaktiva och kognitiva systemAbstract : The fast technology development for military unmanned ground vehicles (UGVs) has led to a considerable demand to explore the soldier’s role in an interactive UGV system. This thesis explores how to design interactive systems for UGVs for infantry soldiers in the Swedish Armed Force. READ MORE
-
19. The Kiruna town move : Unearthing the possibilities for full-scale fire tests
University essay from Luleå tekniska universitet/Byggkonstruktion och brandAbstract : The work with this thesis started during the last semester at the Fire Protection Engineering program at Luleå University of Technology. Kiruna has relied on the iron ore resources of Luossavaara and Kiirunavaara since the creation of the town. The iron ore stretches underneath the current city center. READ MORE
-
20. Understanding the MicroScope Microarchitectural Replay Attack Through a New Implementation
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Side-channel attacks, where information is extracted through analysis of the implementation of a computer system by a malicious adversary, constitute security vulnerabilities that may be hard to mitigate. They however suffer from noise originating from, for example, other processes or frequent cache evictions, which forces an attacker to repeat the attack a large number of times in order to obtain useful information. READ MORE