Essays about: "process checking"

Showing result 11 - 15 of 88 essays containing the words process checking.

  1. 11. Reasoning about Moving Target Defense in Attack Modeling Formalisms

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gabriel Ballot; [2022]
    Keywords : Timed Model checking; Cyber Security; Threat Modeling; Moving Target Defense; Tidsinställd modellkontroll; Cybersäkerhet; Hotmodellering; Moving Target Defense;

    Abstract : Since 2009, Moving Target Defense (MTD) has become a new paradigm of defensive mechanism that frequently changes the state of the target system to confuse the attacker. This frequent change is costly and leads to a trade-off between misleading the attacker and disrupting the quality of service. READ MORE

  2. 12. Sensor fusion between positioning system and mixed reality

    University essay from Linköpings universitet/Tekniska fakulteten; Linköpings universitet/Institutionen för datavetenskap

    Author : Anton Lifwergren; Jonsson Jonatan; [2022]
    Keywords : Sensor Fusion; MR; Mixed Reality; AR; Augmented Reality; Positioning; Local Positioning System; Transformation; Mining; Sensorfusion; MR; Mixed Reality; AR; Augmented Reality; Lokalt Positionerings System; Positionering; Transformation; Gruva;

    Abstract : In situations where we want to use mixed reality systems over larger areas, it is necessary for these systems to maintain a correct orientation with respect to the real world. A solution for synchronizing the mixed reality and the real world over time is therefore essential to provide a good user experience. READ MORE

  3. 13. Using active learning for semi-automatically labeling a dataset of fisheye distorted images for object detection

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Olof Bourghardt; [2022]
    Keywords : Machine learning; Object detection; Computer vision; Semi-automatic data labeling; Fisheye images;

    Abstract : Self-driving vehicles has become a hot topic in today's industry during the past years and companies all around the globe are attempting to solve the complex task of developing vehicles that can safely navigate roads and traffic without the assistance of a driver.  As deep learning and computer vision becomes more streamlined and with the possibility of using fisheye cameras as a cheap alternative to external sensors some companies have begun researching the possibility for assisted driving on vehicles such as electrical scooters to prevent injuries and accidents by detecting dangerous situations as well as promoting a sustainable infrastructure. READ MORE

  4. 14. A comparison of the Basel III capital requirement models for financial institutions

    University essay from Lunds universitet/Matematisk statistik

    Author : Sara Johannesson; Amanda Wahlberg; [2022]
    Keywords : Basel III; Internal Model Method IMM ; Standardized Approch for Counterparty Credit Risk SA-CCR ; Counterparty Credit Risk; Capital Requirement; Mathematics and Statistics;

    Abstract : The purpose of this report is to implement and compare the two Basel III standard methods on how to calculate the capital requirement for finan- cial institutions, related to counterparty credit risk. The models being the Standardized Approach for Counterparty Credit Risk (SA-CCR) and the Internal Model Method (IMM). READ MORE

  5. 15. Detection of performance anomalies through Process Mining

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Carmine Marra; [2022]
    Keywords : Process mining; Conformance Checking; performance anomalies; ERTMS ETCS; Railway system; complex computer systems.;

    Abstract : Anomaly detection in computer systems operating within complex environments,such as cyber-physical systems (CPS), has become increasingly popularduring these last years due to useful insights this process can provide aboutcomputer systems’ health conditions against known reference nominal states.As performance anomalies lead degraded service delivery, and, eventually,system-wide failures, promptly detecting such anomalies may trigger timelyrecovery responses. READ MORE