Essays about: "use of computer in information technology"

Showing result 1 - 5 of 163 essays containing the words use of computer in information technology.

  1. 1. Robust Issue Tracking Application (RITA) : Developing an issue tracker using modern web technologies

    University essay from Mittuniversitetet/Avdelningen för informationssystem och -teknologi

    Author : Stefan Åhman; [2017]
    Keywords : issue tracker; issue tracking; Javascript; Node.js; AngularJS; EmberJS; Sequelize; ORM; MVC; SPA;

    Abstract : Issue tracking is one of the vital parts in maintaining computer  systems.  It is utilized in anything from small independent companies to large enterprises. READ MORE

  2. 2. History Hunt : Raising User’s Curiosity towards Places of Historical Value using Narrative-driven, Location-based Augmented Reality

    University essay from Linnéuniversitetet/Institutionen för medieteknik (ME)

    Author : Eric Olsson; [2017]
    Keywords : augmented reality; human-computer interaction; geolocation; narrative; historical information; Förstärkt verklighet; navigationssystem; applikation; narrativ; historisk information; människa-datorinteraktion;

    Abstract : Today our society is greatly built on modern technologies. In most parts of the world itis a social standard to have access to a smartphone and the Internet. Being able to keepin touch with others, consuming information, or being entertained independent of placeand time are assumed standards. READ MORE

  3. 3. Application security for embedded systems

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Fredrik Hagfjäll; Mikael Bäckman; [2017]
    Keywords : linux; security; isolation; embedded systems; Technology and Engineering;

    Abstract : With the rise of Internet of Things (IoT) accessories such as network attached cameras, light bulbs and thermostats are all constantly connected to the Internet and security concerns must be taken seriously. If a bug exists in an application it could be hacked by a malicious adversary that then could harm the underlying system, leak information or attack other devices or networks. READ MORE

  4. 4. Multi agent control with LTL specifications and abstraction with input memories

    University essay from KTH/Reglerteknik

    Author : Paul Rousse; [2017]
    Keywords : ;

    Abstract : Formal controller synthesis methods with temporal logic specications tryto guarantee the correctness of given specications with a system that mighthave complex behaviour. Most often, discrete abstractions of a continuoussystem are used in order to reduce the size of the problem. READ MORE

  5. 5. Data transformation using linked data ontologies

    University essay from Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskap; Lunds universitet/Lantmäteri (CI)

    Author : Gunnar Rolander; [2017]
    Keywords : linked data; Geographical Information Systems GIS ; semantic web; ontologies; data transformation; Technology and Engineering; Earth and Environmental Sciences;

    Abstract : Interoperability is a sought after quality in most software. One way to increase interoperability is to make transformation of data between formats easier. Several transformation tools exists and many utilizes the Extract, Transform, Load-process to perform the transformations. READ MORE