Essays about: "Medieteknik"
Showing result 1 - 5 of 643 essays containing the word Medieteknik.
-
1. A look into the effectivity of autonomous mobility on-demand
University essay from Malmö universitet/Institutionen för datavetenskap och medieteknik (DVMT)Abstract : .... READ MORE
-
2. Supplementing Dependabot’svulnerability scanning : A Custom Pipeline for Tracing DependencyUsage in JavaScript Projects
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Software systems are becoming increasingly complex, with developers frequentlyutilizing numerous dependencies. In this landscape, accurate tracking and understanding of dependencies within JavaScript and TypeScript codebases are vital formaintaining software security and quality. READ MORE
-
3. Time Series Forecasting on Database Storage
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Time Series Forecasting has become vital in various industries ranging from weather forecasting to business forecasting. There is a need to research database storage solutions for companies in order to optimize resource allocation, enhance decision making process and enable predictive data storage maintenance. READ MORE
-
4. Case Study: Assessing the Security of a ZigBee Smart HomeNetwork
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Utilizing the ZigBee protocol is pervasive in the context of smart homes, offering substantial convenience to individuals. However, smart home devices commonly handle significant quantities of real-world information, potentially giving rise to concerns related to information leakage. READ MORE
-
5. Code Review Application : Simplifying code review through data flow visualization
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : From a security standpoint, manual code review is widely regarded as a dependable practice, particularly in systems with heightened security needs. However, it is also a time-consuming and laborious task that requires careful consideration. READ MORE