Essays about: "Medieteknik"

Showing result 1 - 5 of 643 essays containing the word Medieteknik.

  1. 1. A look into the effectivity of autonomous mobility on-demand

    University essay from Malmö universitet/Institutionen för datavetenskap och medieteknik (DVMT)

    Author : Isak Holmqvist; [2024]
    Keywords : Mobility on-demand;

    Abstract : .... READ MORE

  2. 2. Supplementing Dependabot’svulnerability scanning : A Custom Pipeline for Tracing DependencyUsage in JavaScript Projects

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Isak Karlsson; David Ljungberg; [2024]
    Keywords : Vulnerability scanning; Software Dependencies; JavaScript; TypeScript; Dependabot; Vulnerability Scanning Tools; Software Security; Pipeline; GitHub; Dependency Management;

    Abstract : Software systems are becoming increasingly complex, with developers frequentlyutilizing numerous dependencies. In this landscape, accurate tracking and understanding of dependencies within JavaScript and TypeScript codebases are vital formaintaining software security and quality. READ MORE

  3. 3. Time Series Forecasting on Database Storage

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Pranav Patel; [2024]
    Keywords : Machine Learning; Time Series Forecasting; Prediction; Neural Networks; CNN; RNN; Database Storage;

    Abstract : Time Series Forecasting has become vital in various industries ranging from weather forecasting to business forecasting. There is a need to research database storage solutions for companies in order to optimize resource allocation, enhance decision making process and enable predictive data storage maintenance. READ MORE

  4. 4. Case Study: Assessing the Security of a ZigBee Smart HomeNetwork

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Robal Saker; Obaida Abu Issa; [2024]
    Keywords : ZigBee; vulnerabilities; smart home; technical user; non-technical user;

    Abstract : Utilizing the ZigBee protocol is pervasive in the context of smart homes, offering substantial convenience to individuals. However, smart home devices commonly handle significant quantities of real-world information, potentially giving rise to concerns related to information leakage. READ MORE

  5. 5. Code Review Application : Simplifying code review through data flow visualization

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Viktor Möllerström; Jesper Roos; [2023]
    Keywords : data flow; visualization; code review; security;

    Abstract : From a security standpoint, manual code review is widely regarded as a dependable practice, particularly in systems with heightened security needs. However, it is also a time-consuming and laborious task that requires careful consideration. READ MORE