Essays about: "log system thesis"

Showing result 1 - 5 of 134 essays containing the words log system thesis.

  1. 1. Log Frequency Analysis for Anomaly Detection in Cloud Environments

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Prathyusha Bendapudi; [2024]
    Keywords : Log Analysis; Log Frequency Patterns; anomaly detection; machine learning; cloud environments;

    Abstract : Background: Log analysis has been proven to be highly beneficial in monitoring system behaviour, detecting errors and anomalies, and predicting future trends in systems and applications. However, with continuous evolution of these systems and applications, the amount of log data generated on a timely basis is increasing rapidly. READ MORE

  2. 2. Web interface for a multi-purpose transmitter

    University essay from

    Author : Elin Cederlöf; Maximilian Mattsson; [2023]
    Keywords : Web interface; programming; JavaScript; CSS; HTML; Azure; RTOS;

    Abstract : The project described in this report aims to construct a web interface for a multi-purpose transmitter (MPT). The MPT is a submodule that is meant to be used in future chromatography systems. This bachelor thesis project is done at Cytiva in Uppsala. READ MORE

  3. 3. Simulation and Testing of a MU-MIMO Beamforming System

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Nazyar Mehdishishavan; Zonghan Wang; [2023]
    Keywords : Multi-User Multiple-Input Multiple-Output MU-MIMO ; Beamforming; Sounding Reference Signal SRS ; Reciprocity-based; Butler matrix; Advanced Antenna System AAS ; Technology and Engineering;

    Abstract : Multi-User Multiple-Input Multiple-Output (MU-MIMO) technology has become increasingly important in the field of wireless communication due to its ability to highly increase the capacity and efficiency of wireless networks [1]. Beamforming, as a technique used in MU-MIMO systems, improves network performance by improving signal quality and reducing interference. READ MORE

  4. 4. An Attribution Method for Alerts in an Educational Cyber Range based on Graph Database

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yang Wang; [2023]
    Keywords : Network Attribution. Cyber Range; Ethical Hacking Course. Graph Database.; Nätverksattribuering; Cyberområde; Etisk Hackningskurs; Grafisk Databas;

    Abstract : Finding the source of events in a network is a critical problem in network security, and this process is called network attribution. This thesis develops a system to attribute alerts from the cyber range of the Ethical Hacking Course at KTH to students. The cyber range is an essential component of the Ethical Hacking course. READ MORE

  5. 5. An evaluation of the reliability and usability in Cambio Cosmics journal system

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Mathilda Holmström; Stina Gustafsson; [2023]
    Keywords : ;

    Abstract : The main focus of this thesis is to research the usability and reliability of the patient-focused journal system Cosmic that is created by the company Cambio. The system is widely used in Sweden, increasing the pressure on the system to perform well and meet the needs of the healthcare personnel. READ MORE