Essays about: "use of computer technology"

Showing result 1 - 5 of 1089 essays containing the words use of computer technology.

  1. 1. Force Type ID, a Two-Factor-Authentication based on force sensitive keys and password

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Fawad Ahmad; [2024]
    Keywords : ;

    Abstract : The conventional computer keyboard keys work as binary switch systems and have stayed the same since the invention of typewriters. With the accelerated progress in forcesensing technology, force-sensitive keyboards have become viable consumer products due to advancements in manufacturing. READ MORE

  2. 2. Real-Time System Benchmarking with Embedded Linux and RT Linux on a Multi-Core Hardware Platform

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Kian Hosseini; [2024]
    Keywords : Real-time; Embedded systems; Benchmarking; Multicore;

    Abstract : To catch up with the growing trend of parallelism, this thesis work focuses on the adaption of embedded real-time systems to a multicore platform. We use the embedded system of Xilinx ZCU-102, a multicore board, as an example of an embedded system without getting deep into its architecture. READ MORE

  3. 3. Linking for Peace. An affordance perspective of LinkedIn as an instrument for peace professionals to advance constructive conflict resolution and transformative efforts

    University essay from Institutionen för tillämpad informationsteknologi

    Author : Jasmine Traore; [2023-11-22]
    Keywords : Affordances; Human Computer Interaction HCI ; Peace and Conflict Research;

    Abstract : Has LinkedIn become the platform for a global community of practice for peace professionals? Does it have the potential to be? An inductive approach to Reflexive Thematic Analysis (RTA) following Braun and Clarke’s six-phase methodology was used as an analytic instrument on empirical data from 13 semi-structured interviews with professionals in peace mediation, using the theoretical lens of affordances. The participants in the study were found to use LinkedIn to create and sustain meaningful connections globally and across sectors, learn from empirical knowledge, stories and insights from others and explore economic opportunities. READ MORE

  4. 4. A type-driven approach for sensitivity checking with branching

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Daniel Freiermuth; [2023-10-24]
    Keywords : Computer; science; computer science; thesis; differential privacy; type system; sensitivity; branching;

    Abstract : Differential Privacy (DP) is a promising approach to allow privacy preserving statistics over large datasets of sensitive data. It works by adding random noise to the result of the analytics. Understanding the sensitivity of a query is key to add the right amount of noise capable of protecting privacy of individuals in the dataset. READ MORE

  5. 5. Ensuring the Security of PyPI Packages

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : David Shakoori Gustafsson; [2023-10-23]
    Keywords : Computer science; Security; Python; PyPI; Typosquatting;

    Abstract : Developers often use open-source code libraries in order to achieve desired functionalities without needing to re-implement existing code. Python developers are no exceptions here, and frequently use the Python Package Index, PyPI, to download the specific code packages they want to use. READ MORE