Essays about: "system of security"

Showing result 11 - 15 of 1739 essays containing the words system of security.

  1. 11. Natural Language Processing on the Balance of theSwedish Software Industry and Higher VocationalEducation

    University essay from Mittuniversitetet/Institutionen för kommunikation, kvalitetsteknik och informationssystem (2023-)

    Author : Emil Bäckstrand; Rasmus Djupedal; [2023]
    Keywords : Swedish Software Industry; Higher Vocational Education; Software Engineering; Latent Dirichlet Allocation; Document Frequency Analysis;

    Abstract : The Swedish software industry is fast-growing and in needof competent personnel, the education system is on the frontline of producing qualified graduates to meet the job marketdemand. Reports and studies show there exists a gapbetween industry needs and what is taught in highereducation, and that there is an undefined skills shortageleading to recruitment failures. READ MORE

  2. 12. Deep Learning Model Deployment for Spaceborne Reconfigurable Hardware : A flexible acceleration approach

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Javier Ferre Martin; [2023]
    Keywords : Space Situational Awareness; Deep Learning; Convolutional Neural Networks; FieldProgrammable Gate Arrays; System-On-Chip; Computer Vision; Dynamic Partial Reconfiguration; High-Level Synthesis; Rymdsituationstänksamhet; Djupinlärning; Konvolutionsnätverk; Omkonfigurerbara Field-Programmable Gate Arrays FPGAs ; System-On-Chip SoC ; Datorseende; Dynamisk partiell omkonfigurering; Högnivåsyntes.;

    Abstract : Space debris and space situational awareness (SSA) have become growing concerns for national security and the sustainability of space operations, where timely detection and tracking of space objects is critical in preventing collision events. Traditional computer-vision algorithms have been used extensively to solve detection and tracking problems in flight, but recently deep learning approaches have seen widespread adoption in non-space related applications for their high accuracy. READ MORE

  3. 13. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution

    University essay from KTH/Hälsoinformatik och logistik

    Author : Victor Pero; Linus Ekman; [2023]
    Keywords : Zero Trust; GitLab; Keycloak; OpenVPN; data protection; network security; access control; Zero Trust; GitLab; Keycloak; OpenVPN; dataskydd; nätverkssäkerhet; åtkomstkontroll;

    Abstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE

  4. 14. Evaluating intrusion detection points in an end-to-end solution

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Lilla Pankaczi; [2023]
    Keywords : RFID; Random UID; Mutual Authentication; Scyther;

    Abstract : Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. READ MORE

  5. 15. Studies on future Mine Countermeasure Vessels (MCMV)

    University essay from Blekinge Tekniska Högskola/Institutionen för matematik och naturvetenskap

    Author : Philip Somehagen; [2023]
    Keywords : Concept development; Mine countermeasure vessels; ROV; Sonar; Konceptutveckling; Minjaktsfartyg; ROV; Sonar;

    Abstract : Background Maritime transportation is vital for international trade, and any disruption to this flow can have severe financial and environmental consequences. Ship mines, both old and new, present significant risks as man-made obstacles. READ MORE