Essays about: "Development of a Cloud"

Showing result 21 - 25 of 321 essays containing the words Development of a Cloud.

  1. 21. A Holistic Framework for Analyzing the Reliability of IoT Devices

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Leonardo Manca; [2023]
    Keywords : Canvas Learning Management System; Docker containers; Performance tuning Performance tuning; Internet of Things IoT ; Reliability; Failure rate; Availability; Comprehensive framework; IoT architecture; Failure modes; Reliability Block Diagram RBD ; Prestandajustering; Sakernas internet IoT ; Tillförlitlighet; Felfrekvens; Tillgänglighet; Heltäckande ramverk; IoT-arkitektur; Felfunktioner; Till-förlitlighetsblockdiagram RBD Canvas Lärplattform; Dockerbehållare; Prestandajustering;

    Abstract : In the rapidly evolving landscape of the Internet of Things (IoT), ensuring consistency and reliability becomes a top priority for a seamless user experience. In many instances, reliability is assessed through Quality of Service (QoS) metrics, sidelining traditional reliability metrics that thrive on time-dependent failure rates. READ MORE

  2. 22. Confidential Federated Learning with Homomorphic Encryption

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zekun Wang; [2023]
    Keywords : Cloud Technology; Confidential Computing; Federated Learning; Homomorphic Encryption; Trusted Execution Environment; Molnteknik; Konfidentiell databehandling; Federerad inlärning; Homomorfisk kryptering; Betrodd körningsmiljö;

    Abstract : Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information. READ MORE

  3. 23. A Bayesian Bee Colony Algorithm for Hyperparameter Tuning of Stochastic SNNs : A design, development, and proposal of a stochastic spiking neural network and associated tuner

    University essay from Uppsala universitet/Signaler och system

    Author : Oskar Falkeström; [2023]
    Keywords : edge computing; edge user allocation; constraint satisfaction problem; bin packing problem; spiking neural networks; SNN; stochastic spiking neural networks; neuromorphic computing; hyperparameter tuning; swarm intellience; artificial bee colony algorithm; tree-structured Parzen estimator; stochastic optimization; Bayesian optimization.;

    Abstract : With the world experiencing a rapid increase in the number of cloud devices, continuing to ensure high-quality connections requires a reimagining of cloud. One proponent, edge computing, consists of many distributed and close-to-consumer edge servers that are hired by the service providers. READ MORE

  4. 24. Application development of 3D LiDAR sensor for display computers

    University essay from Uppsala universitet/Signaler och system

    Author : Oskar Ekstrand; [2023]
    Keywords : LiDAR; 3D sensor; display computer; application; high-resolution 3D map; visualize real time data; CPU load; Voxel grid filter; Point Cloud Library; Qt QML; C ; Linux; LiDAR; 3D sensor; fordons dator; applikation; högupplöst 3D-karta; visualisera realtidsdata; processorlast; Voxel grid filter; Point Cloud Library; Qt QML; C ; Linux;

    Abstract : A highly accurate sensor for measuring distances, used for creating high-resolution 3D maps of the environment, utilize “Light Detection And Ranging” (LiDAR) technology. This degree project aims to investigate the implementation of 3D LiDAR sensors into off-highway vehicle display computers, called CCpilots. READ MORE

  5. 25. HackerGraph : Creating a knowledge graph for security assessment of AWS systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexios Stournaras; [2023]
    Keywords : Cloud security; Knowledge graph; Attack graph; Vulnerability ssessment; Attack paths; Vulnerable-by-design systems; Cloudgoat; Molnsäkerhet; Kunskapsgraf; Attackgraf; Sårbarhetsanalysis; Sårbara miljöer; Cloudgoat;

    Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE