Essays about: "a distributed"

Showing result 16 - 20 of 3143 essays containing the words a distributed.

  1. 16. The West African Coup Trap : A qualitative case study of military coups d'état in Mali, Niger, Burkina Faso, and Guinea

    University essay from Linnéuniversitetet/Institutionen för statsvetenskap (ST)

    Author : Joy Hansen; [2024]
    Keywords : Coup d état; Mali; Niger; Burkina Faso; Guinea; External impact; Climate change; Political instability; France; Russia;

    Abstract : Africa is the continent having the most coups d'état. From 2020 to 2022, there were six coups and three coup attempts on the continent. This study aims to investigate the causes of these coups d'état in Mali, Burkina Faso, Niger, and Guinea, four former French colonies in West Africa. READ MORE

  2. 17. Probabilistic Exact Inversion of 2-qubit Bipartite Unitary Operations using Local Operations and Classical Communication

    University essay from KTH/Fysik

    Author : Ludvig Lindström; [2024]
    Keywords : Resource Theory; Resource theory of entanglement; Quantum Information Theory; Quantum Computing; Distributed Quantum Computing; Higher-order quantum transformation; Quantum Algorithms; Quantum Physics; Resursteori; Resursteori för Kvantsammanflätning; Kvantinformationsteori; Kvantdatorer; Distribuerade kvantdatorer; Högre ordningens kvanttransformationer; Kvantalgoritmer; Kvantfysik;

    Abstract : A distributed quantum computer holds the potential to emulate a larger quantumcomputer by being partitioned it into smaller modules where local operations (LO)can be applied, and classical communication (CC) can be utilized between thesemodules. Finding algorithms under LOCC restrictions is crucial for leveraging thecapabilities of distributed quantum computing, This thesis explores probabilisticexact LOCC supermaps, that maps 2-qubit bipartite unitary operations to its inver-sion and complex conjugation. READ MORE

  3. 18. Battery Degradation and Health Monitoring in Lithium-Ion Batteries: An Evaluation of Parameterization and Sensor Fusion Strategies

    University essay from Linköpings universitet/Institutionen för systemteknik

    Author : Simon Saber; [2024]
    Keywords : model-based diagnostics; modellbaserad diagnostik;

    Abstract : The purpose of this project was to perform model-based diagnosis on Li-ion batteries using real-world data and sensor fusion algorithms. The data used in this project was collected and distributed by NASA and mainly consists of voltage and current measurements collected on numerous batteries that were repeatedly charged and discharged from their beginning of life, and until surpassing their end of life. READ MORE

  4. 19. Blockchain-based e-voting system without digital ID: A Proof-of-Concept

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Leonard Schick; [2024]
    Keywords : Computer science; Cryptography; Crypto; Blockchain; Distributed systems; e-voting; electronic voting; Ethereum; Hyperledger; Hyperledger besu; Decentralization; Datavetenskap; Kryptografi; Blockkedja; Distribuerade system; e-röstning; Elektronisk röstning; Blinda signaturer; Ethereum; Hyperledger Besu; Decentralisering;

    Abstract : Electronic voting systems have the potential to offer a cost effective, secure and transparent way of communicating with the citizens, increasing trust and participation. However creating a secure open source electronic voting system providing confidentiality and transparency with sufficient performance has long been a challenge. READ MORE

  5. 20. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yashwanth Venkata Sai Kumar Adabala; Lakshmi Venkata Raghava Sudheer Devanaboina; [2024]
    Keywords : Software Defined Networking; SDN; IP Spoofing; Flooding; DDoS Attacks; Mininet; Snort IDS; Network Security;

    Abstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE