Essays about: "modules"

Showing result 11 - 15 of 878 essays containing the word modules.

  1. 11. Handling Third-Party Component Licenses:A Case Study in a Swedish Company : How well do existing license management tools detect potentially unsafe third-party component licenses?

    University essay from Högskolan Dalarna/Informatik

    Author : Fanny Bruckner; Isac Njie; [2023]
    Keywords : Third-party components; software licenses; component analysis tools;

    Abstract : Modern software development relies heavily on third-party components, which are pre-built software modules developed by other organisations and can be either open-source or commercial. These components serve as building blocks for developers to create complex applications more efficiently. READ MORE

  2. 12. Exploring the solar park market in Lower Saxony : Implications on foreign companies’ entry strategies

    University essay from Linköpings universitet/Industriell miljöteknik

    Author : Patricia Chronéer; Nike Hammerman; [2023]
    Keywords : Solar Parks; Lower Saxony; Germany; Entry Strategies; Drivers; Barriers; Regulatory Landscape; Social Landscape; Technical Landscape; Economic Landscape; Geographical Landscape; Market Potential; Electricity Production;

    Abstract : To meet the European Union’s target of climate neutrality by 2050 ambitious measures need to be taken. The electricity sector is one of the largest contributors to greenhouse gas emissions globally, which makes it an important sector to decarbonize. For this to happen, fossil fuels must be replaced by renewable energy sources. READ MORE

  3. 13. Code Synthesis for Heterogeneous Platforms

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zhouxiang Fu; [2023]
    Keywords : Code Synthesis; Heterogeneous Platform; Zero-Overhead Topology Infrastructure; Kodsyntes; Heterogen plattform; Zero-Overhead Topologi Infrastruktur;

    Abstract : Heterogeneous platforms, systems with both general-purpose processors and task-specific hardware, are largely used in industry to increase efficiency, but the heterogeneity also increases the difficulty of design and verification. We often need to wait for the completion of all the modules to know whether the functionality of the design is correct or not, which can cause costly and tedious design iteration cycles. READ MORE

  4. 14. Biodiversity Monitoring Using Machine Learning for Animal Detection and Tracking

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Qian Zhou; [2023]
    Keywords : Small Target Detection; Target Tracking; YOLOv5; DeepSORT; Attention Mechanism; Loss Function; Feature Extraction and Fusion Network; Detektering Av små sål; sålspårning; YOLOv5; DeepSORT; uppmärksamhetsmekanism; förlustfunktion; fusionsnätverk;

    Abstract : As an important indicator of biodiversity and ecological environment in a region, the number and distribution of animals has been given more and more attention by agencies such as nature reserves, wetland parks, and animal protection supervision departments. To protect biodiversity, we need to be able to detect and track the movement of animals to understand which animals are visiting the space. READ MORE

  5. 15. Antivirus performance in detecting Metasploit payloads : A Case Study on Anti-Virus Effectiveness

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Eric Nyberg; Leandro Dinis Ferreira; [2023]
    Keywords : Metasploit; Anti-Virus Effectivness; AV Effectiveness; MSFVenom; Antivirus; AV Software; Metasploit Encoding; Encodings; Detection rates; AV Efficiency; Antivirus efficiency; payloads; payload detection..;

    Abstract : This paper will focus solely on the effectiveness of AV (antivirus) in detecting Metasploit payloads which have been encapsulated with different encapsulation modules. There seems to be a significant knowledge gap in the evaluation of commercial antivirus's software and their ability to detect malicious code and stop such code from being executed on IT systems. READ MORE