Essays about: "Conclusion of computer system"

Showing result 1 - 5 of 87 essays containing the words Conclusion of computer system.

  1. 1. Evaluation of the NESizer2 method as a means of wrapping embedded legacy systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS); KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : David Henriksson; Eliaz Sundberg; [2019]
    Keywords : Legacy components; modernizing; microcontroller; data injection; Atmega328P; Ricoh 2A03;

    Abstract : Legacy computer systems are systems where several of the main hardware and software components date back several decades. Modernizing these systems is often considered a large monetary and temporal investment with high risk, and to keep maintaining them usually becomes more and more difficult over time, which is why these legacy systems are still being used to this day in many industry sectors. READ MORE

  2. 2. Attacking the Manufacturing Execution System : Leveraging a Programmable Logic Controller on the Shop Floor

    University essay from

    Author : Fredrik Johansson; [2019]
    Keywords : Manufacturing Execution System; Programmable logic controller; attack types; Manufacturing execution system; Programmable logic controller; attack typer;

    Abstract : Background. Automation in production has become a necessity for producing companies to keep up with the demand created by their customers. One way to automate a process is to use a piece of hardware called a programmable logic controller (PLC). A PLC is a small computer capable of being programmed to process a set of inputs, from e. READ MORE

  3. 3. Phishing attacks targeting hospitals : A study over phishing knowledge at Blekingesjukhuset

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Daniella Nordgren; [2018]
    Keywords : Phishing; Ransomware; Social engineering; Hospital;

    Abstract : Context. Phishing emails is a type of computer attack targeting users and tries to trick them into giving out personal information, follow shady links or download malicious attachments. Phishing is often closely linked to ransomware, which is a type of attack that locks a users computer and asks for a ransom in order to give access back. READ MORE

  4. 4. Accelerated Simulation of Modelica Models Using an FPGA-Based Approach

    University essay from Linköpings universitet/Datorteknik; Linköpings universitet/Datorteknik

    Author : Herman Lundkvist; Alexander Yngve; [2018]
    Keywords : FPGA; Modelica; VHDL; MBSE; model simulation; ODE; HLS; hardware acceleration; PCIe; ZYNQ;

    Abstract : This thesis presents Monza, a system for accelerating the simulation of modelsof physical systems described by ordinary differential equations, using a generalpurpose computer with a PCIe FPGA expansion card. The system allows bothautomatic generation of an FPGA implementation from a model described in theModelica programming language, and simulation of said system. READ MORE

  5. 5. Developing Data Extraction and Dynamic Data Visualization (Styling) Modules for Web GIS Risk Assessment System (WGRAS)

    University essay from Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskap

    Author : Daniel Assefa; [2018]
    Keywords : Geographical Information Systems; GIS; Disaster Risk Management; web GIS; Volunteered Geographic Information VGI ; Map Visualization and styling; Geo-spatial data extraction; OpenStreetMap OSM ; Earth and Environmental Sciences;

    Abstract : Interactive web-GIS tools play an important role in determining disaster risk assessment which ultimately result in reduction of unexpected damages, cost and saves millions of lives. Disaster management practitioners largely benefited information at their disposal about location where possible incidents are eminent, anticipate the impact and project possible outcomes to help mitigate and organize proper response. READ MORE