Essays about: "siavash"
Showing result 1 - 5 of 8 essays containing the word siavash.
-
1. Security Guidelines for the Usage of Open Source Software
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Open-source software is in average used in more than 65% of the applications within the domains of enterprise software, retail and e-commerce, cybersecurity and internet of things (Synopsys, 2019). With the frequent use of open-source software, security issues arise which need to be handled. READ MORE
-
2. Elaborate Operational Requirements to Address Reward Hacking in Reinforcement Learning Agents
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Autonomous agents, in recent times have been used to address several problems, but these agents in their course of achieving their task also emit side effects to the environment in which they operate. Paramount of these side effects is reward hacking. In this report, we try to address reward hacking using elaborate operational requirements. READ MORE
-
3. Dynamic analysis of soil-steel composite railway bridges : FE-modeling in Plaxis
University essay from KTH/Bro- och stålbyggnadAbstract : A soil-steel composite bridge is a structure comprised of corrugated steel plates, which are joined with bolted connections, enclosed in friction soil material on both sides and on the top. The surrounding friction soil material, or backfill, is applied in sequential steps, each step involving compaction of the soil, which is a necessity for the construction to accumulate the required bearing capacity. READ MORE
-
4. Performance comparison of KVM and XEN for telecommunication services
University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknikAbstract : High stability of telecommunication services has a positive e ect on customer satisfaction and thus helps to maintain competitiveness of the product in telecommunication market. Since live migration provides a minimal down- time of virtual machines, it is deployed by telecommunication companies to ensure high availability of services and to prevent service interruptions. READ MORE
-
5. Evaluation of Storage Area Network (SAN) security and performance
University essay from Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE)Abstract : Due to growing the number of Information Technology (IT) users all around the world, consequently the amount of data that needs to be stored is increasing day by day. Single attached disks and old storage technologies cannot manage the storing these amounts of data. READ MORE